Commonwealth v. Shaffer, J., Aplt.
Commonwealth v. Shaffer, J., Aplt.
Opinion of the Court
This is an appeal from the judgment of the Superior Court, which affirmed the trial court's order denying a motion to suppress images of child pornography discovered by a computer repair shop employee after Jon Eric Shaffer ("Appellant") took his laptop to the commercial establishment for repair and consented to the replacement of the laptop's hard drive. The Superior Court held that the trial court did not err in denying suppression because Appellant abandoned his reasonable expectation of privacy in the computer files under the facts presented. We affirm the judgment of the Superior Court, albeit on different grounds. See Commonwealth v. Wholaver ,
We hold that because the contraband images were discovered by a computer technician who was not acting as an agent of the government and because the police officer's subsequent viewing of the contraband images did not exceed the scope of the computer technician's search, the private search doctrine applies and Appellant's constitutional privacy protections are not implicated.
I. Background
The facts of this case, as revealed during the suppression hearing, are as follows. On November 25, 2015, Appellant delivered his laptop computer to CompuGig, a computer repair shop. To obtain repair services, Appellant was required to complete CompuGig's intake form, which queried "What problems are you experiencing?" and listed several alternatives. Commonwealth Exhibit 1. Appellant marked the boxes indicating "Spyware/virus" and "Can't get to Internet."
After conducting diagnostic testing, CompuGig technician Justin Eidenmiller believed that Appellant's computer had a failing hard drive. Consistent with CompuGig's policy of contacting the customer for approval if the service charges will exceed $160, an administrative employee called Appellant on December 4, 2015, and Appellant consented to the replacement of the hard drive.
The next day, after several unsuccessful attempts to transfer files from the hard drive, Eidenmiller continued his efforts to relocate the contents of the hard drive to the new hard drive by manually opening each individual folder and copying the contents. Id. at 7. During this process, Eidenmiller observed thumbnail images, i.e. , small images reflecting the identify of a computer file's contents, revealing what he believed to be sexually explicit photos of children. Id. at 7, 23-24. Notably, Eidenmiller had not been searching for that kind of information and had never been asked by law enforcement to keep watch for evidence of child pornography. Id. at 7, 13. Eidenmiller informed his boss of the images he discovered, and an administrative employee of CompuGig contacted the police. Id. at 7.
Later that afternoon, Officer Christopher Maloney of the Cranberry Township Police Department arrived at CompuGig. The store owners advised Officer Maloney that technicians had found explicit images of young girls on Appellant's laptop and took the officer to the room where Eidenmiller had been working on the computer. Id. at 28. Officer Maloney asked to see the images that Eidenmiller had found. Id. at 28-29. Eidenmiller complied and showed Officer Maloney the child pornography images he had discovered, using the "exact route taken to find the images." Id. at 9, 30.
On December 11, 2015, Detective Matthew Irvin of the Cranberry Township Police Department went to Appellant's home and questioned him. Appellant admitted to having some images on his computer depicting *961children as young as eight years old in sexually explicit positions and identified the folders where the digital images were stored. Detective Irvin thereafter obtained a search warrant for the laptop and accompanying hardware on December 15, 2015.
On December 18, 2015, Detective Irvin met with Appellant a second time and obtained a written inculpatory statement regarding the illegal images. The following month, on January 21, 2016, a criminal complaint was filed against Appellant charging him with sexual abuse of children (possession of child pornography), 18 Pa.C.S. § 6312(d), for possessing seventy-two digital images, which depicted a child under eighteen years of age engaging in a prohibited sexual act or in the simulation of such act. The complaint also charged Appellant with criminal use of a communication facility (laptop computer), 18 Pa.C.S. § 7512(a), for utilizing the internet to commit, cause or facilitate the commission of the felony of sexual abuse of children.
On May 27, 2016, Appellant filed a pretrial omnibus motion to suppress the contraband images discovered on the hard drive of his laptop computer. Acknowledging that a CompuGig employee had summoned Officer Maloney to the establishment after discovering the illegal images, in his suppression motion, Appellant asserted that an illegal search occurred at the moment Officer Maloney directed the CompuGig employee to open Appellant's computer files and display the suspected contraband images that Eidenmiller had discovered, after which Officer Maloney viewed the images and seized the laptop and the copy of the external hard drive.
Appellant further contended in his suppression motion that this police conduct constituted a warrantless search of his laptop in violation of his reasonable expectation of privacy, as well as a trespass upon his property in violation of Article I, Section 8 of the Pennsylvania Constitution and the Fourth and Fourteenth Amendments to the United States Constitution. Id. at ¶ 8.
*962Id. at ¶ 9. Accordingly, Appellant requested that the trial court suppress the physical evidence seized and all the fruits thereof.
In opposing Appellant's suppression motion, the Commonwealth did not specifically invoke the private search doctrine. Instead, the Commonwealth took the position that once Appellant gave his laptop to CompuGig for repairs, he abandoned his expectation of privacy in the computer files stored on the laptop. In support of this position, the Commonwealth relied upon the Superior Court's decision in Commonwealth v. Sodomsky ,
In Sodomsky , the defendant went to a Circuit City store and requested the installation of an optical drive and DVD burner onto his desktop computer. The defendant was informed that as part of the installation process, the installer would have to make sure that the DVD burner worked. The defendant did not inquire as to how operability of the DVD burner would be determined. After the software was installed, a computer technician performed a general search of the defendant's computer files for a video to test the new DVD drive. During this general search, the technician observed titles of videos which appeared to be pornographic in nature because their titles included masculine first names, ages of either thirteen or fourteen, and sexual acts. The technician clicked on the first video title that appeared questionable, and the video contained the lower torso of an unclothed male and a hand approaching the male's penis. The technician immediately stopped the video and contacted his manager, who summoned the police.
The police arrived at the Circuit City store and viewed the same video clip discovered by the technician. When the defendant arrived shortly thereafter to retrieve his computer, the police informed him that his computer was being seized because police suspected that it contained child pornography. The defendant responded that he knew what they had found and that "his life was over."
On appeal to the Superior Court, the issue was whether the defendant's "expectation of privacy in the videos on the computer that he relinquished to Circuit City employees for repairs was reasonable or whether he knowingly exposed the computer's video files to the public such that he voluntarily abandoned his privacy interest in them."
Emphasizing that abandonment is a question of intent that is dependent upon the facts and circumstances presented, the Sodomsky court concluded that the defendant had no reasonable expectation of privacy in his illegal computer files. First, the *963court observed that the defendant requested the installation of a DVD drive, that Circuit City employees informed him that the drive's operability would be tested, and that the defendant did not inquire as to the manner of testing or restrict the employees' access to his computer files. Sodomsky ,
Although not characterizing the initial search as a private one, the Sodomsky court found it critical that when the child pornography was discovered, the computer technicians were testing the "drive's operability in a commercially-accepted manner" and were not searching for contraband.
The Superior Court distinguished the Sodomsky case from Commonwealth v. DeJohn ,
Finally, the Sodomsky court rejected the defendant's contention that the seizure of the computer was improper absent a warrant. The court held that the plain view exception to the warrant requirement applied because the police had been invited to the repair center in Circuit City, the videos were not obscured and could be readily seen from that location, the incriminating nature of the video files was immediately apparent based on the graphic titles assigned to the videos, and the police had the lawful right to access the videos because the defendant had abandoned any reasonable expectation of privacy in them.
Returning to the instant case, at the suppression hearing on July 7, 2016, two witnesses, Eidenmiller and Officer Maloney, testified to the aforementioned facts. The parties' arguments focused exclusively upon the applicability of the Sodomsky decision. Following the hearing, the trial court denied Appellant's suppression motion, finding that the present facts were similar enough to render Sodomsky controlling. Trial Court Opinion, 10/3/2016, at 7. While the trial court did not agree with the Commonwealth that under Sodomsky Appellant abandoned his expectation of privacy in his computer files as soon as he delivered the laptop for repair, the court held that Appellant abandoned his expectation of privacy when he requested repairs on his computer related to complaints of a virus and an inability to use the Internet *964and consented to the replacement of his hard drive.
The trial court found that the instant circumstances would "obviously lead a person to conclude that CompuGig was likely to perform work related to the hard drive and the files contained on it [and that Appellant] was or should have been aware that he faced a risk of exposing the files contained thereon, as was the case in Sodomsky ." Id. at 9. Also similar to Sodomsky , the trial court held that when the images of child pornography were discovered, the CompuGig technician was not conducting a search for illicit items, but was attempting to transfer the files from Appellant's hard drive to a new drive. Id. The court further opined that Appellant's actions in delivering his laptop to CompuGig for repairs and consenting to the replacement of the laptop's hard drive were voluntary and were not required for Appellant to function in society, distinguishing the case from this Court's decision in DeJohn . Id. at 9-10.
Concluding that Appellant abandoned his privacy interest in the files at issue, the trial court found that he could not object to the subsequent viewing of the files by police as Officer Maloney properly seized the laptop under the plain view exception to the warrant requirement. Id. at 10. The court reasoned that Officer Maloney was lawfully at the CompuGig store at the invitation of the store's owners, the computer and files were not obscured and could be plainly seen from that location, the incriminating nature of the files was readily apparent, and Officer Maloney had a lawful right of access to the computer files because Appellant had abandoned his privacy interest in them. Id. at 10.
The trial court further rejected Appellant's challenge to the search and seizure of his computer based upon a trespass analysis, concluding that Eidenmiller was engaged in conduct permitted by Appellant when the files were discovered; thus, he was not trespassing on Appellant's effects. Id. at 10. Relevant here, the trial court emphasized that Officer Maloney never expanded upon Eidenmiller's actions, but merely viewed the images that Eidenmiller presented to him. Id. at 11.
On November 10, 2016, the trial court, sitting as finder of fact, found Appellant guilty of both charges (possession of child pornography and criminal use of a communication facility) and subsequently sentenced him to an aggregate six to twelve months of incarceration, followed by 156 months of probation. Appellant appealed his judgment of sentence to the Superior Court, raising the single issue of whether the trial court erred in failing to suppress evidence from the warrantless search and seizure of his laptop. As it did before the trial court, the Commonwealth again contended that the Sodomsky decision was controlling, while Appellant maintained that Sodomsky was distinguishable or, in the alternative, should be overturned.
The Superior Court affirmed Appellant's judgment of sentence in a published decision. Commonwealth v. Shaffer ,
The court emphasized that in Sodomsky , the defendant made a similar contention, *965alleging that he was unaware that the technician intended to run a test on the new DVD drive using a video from the defendant's hard drive. In both cases, the Superior Court reasoned, the defendants did not inquire as to how the repair procedure would be executed or restrict in any way the computer technician's access to the illegal files.
As noted, this Court granted allowance of appeal to determine whether the Superior Court erred in determining that Appellant abandoned his expectation of privacy in child pornography files stored on his computer under the facts presented.
II. The Parties' Arguments
Appellant contends that the trial court erred in denying suppression of the physical evidence obtained from his laptop and his resulting confessions because such evidence was obtained without a warrant or consent and in the absence of exigent circumstances, thereby violating his right against unreasonable searches and seizures under both Article I, Section 8 of the Pennsylvania Constitution and the Fourth Amendment to the United States Constitution.
Appellant maintains that he did not intend to relinquish his reasonable expectation of privacy in his computer files when he took his laptop to CompuGig for enumerated repairs. Further, he submits, it was not reasonably foreseeable that his *966private computer files would be accessed by CompuGig employees. Appellant explains that only a "convoluted chain of events" prompted discovery of the illegal images as Eidenmiller determined that his laptop's hard drive was failing, attempted to copy the entire hard drive to a new drive using particular software, and was ultimately forced to copy folders onto the new hard drive manually. Brief for Appellant, at 10. He asserts that it was not until Eidenmiller was unable to copy some of the folders that the individual files were opened for copying purposes, thereby revealing the contraband images.
Appellant contends that if this scenario is interpreted as being reasonably foreseeable, he cannot imagine an instance where one would retain a reasonable expectation of privacy in his computer files when the computer is taken to a commercial establishment for repair. Emphasizing one's general inability to repair a broken computer, Appellant likens his case to Commonwealth v. DeJohn , supra , where this Court held that one does not lose his reasonable expectation of privacy when he discloses financial records to his bank because disclosure of these records is not entirely volitional, considering that one cannot participate in the economic life of contemporary society without a bank account. He asserts that the same is true for personal computers.
Regarding the application of the Superior Court's decision in Sodomsky , Appellant neither expressly requests that we overrule that decision nor distinguishes that case from the facts presented. He offers only his opinion that the Sodomsky finding of an abandoned expectation of privacy was based, in part, on the defendant's failure to ask the right questions at the computer repair shop. In Appellant's view, "the vast majority of people in our society do not understand computers enough to ask the right questions." Brief for Appellant, at 14. He maintains that other jurisdictions have decided cases in a manner consistent with his position. See U.S. v. Barth ,
Further, while acknowledging that the case is not dispositive, Appellant cites the United States Supreme Court's decision in Riley v. California ,
In response, the Commonwealth first takes the broad position that citizens relinquish their expectation of privacy in closed computer files once they take the computer to a commercial establishment for repair. Based on the theory of abandonment espoused in Sodomsky , it submits that when one takes a computer to a commercial *967repair shop, the individual voluntarily relinquishes control over the computer's contents to the technician who is a member of the public. Regardless of what type of repairs are necessary, the Commonwealth asserts, the individual has complete control over what he exposes as he can delete private files prior to the repair or limit the technician's access to folders or files on the computer. When the individual does not choose to protect his privacy interest and instead simply hands over his computer to a commercial establishment, the Commonwealth asserts that there is an abandonment of any reasonable expectation of privacy.
The Commonwealth refutes Appellant's argument that private files on a laptop are analogous to financial records disclosed to a bank. Unlike in DeJohn , where this Court held that the relinquishment of bank records was not voluntary because one needs a bank account to function in today's society, the Commonwealth reiterates that one retains control over what one exposes to a computer repair shop. See Brief for Appellee, at 10 (citing Sodomsky ,
The Commonwealth further distinguishes the High Court's decision in Riley , supra , which held that police cannot search the contents of a cell phone incident to an arrest without a warrant. It argues that Riley has no application to the instant appeal, which is not focused upon the immense amount of information a computer can store but, rather, on the abandonment of a reasonable expectation of privacy by knowingly exposing personal data to the public.
In the event this Court rejects its broad proposition that one abandons his expectation of privacy each time he takes a computer for repair, the Commonwealth alternatively argues that Appellant abandoned his expectation of privacy under the particular facts presented. It contends that Appellant knew that CompuGig technicians would access his files as he disclosed his computer password to the commercial establishment, authorized it to run diagnostics, was informed that CompuGig needed to do an "OS rebuild with data," and consented to the replacement of his hard drive. The Commonwealth points out that Appellant was not obligated to have the repairs completed, and was free to leave or retrieve his computer at any time. It asserts that there is no evidence that Appellant attempted to keep the files at issue private, considering that he did not remove the contraband files from his computer, did not indicate that there was valuable or private data on the computer, and did not restrict CompuGig's access to the computer in any way.
Thus, the Commonwealth asserts, the record demonstrates that Appellant knowingly and voluntarily granted CompuGig access to his computer files, thereby exposing them to the public and extinguishing his reasonable expectation of privacy. The Commonwealth maintains that other jurisdictions have reached similar results. Brief for Appellee, at 19-21 (citing State v. Horton ,
Finally, the Commonwealth discusses the private search doctrine. See Brief for Appellee at 17 (citing United States v. Jacobsen ,
The Commonwealth finds the Sixth Circuit Court of Appeals' decision in United States v. Lichtenberger ,
In his reply brief, Appellant asserts that the Commonwealth relies upon the private search doctrine in its brief to this Court for the first time in this litigation. He contends that the Commonwealth cites no Pennsylvania case law in support of this doctrine because there is none. Appellant urges this Court not to adopt the private search doctrine as a part of Pennsylvania jurisprudence because there is no record made in the instant case regarding the extent of the private search as compared to the scope of the subsequent police search. Finally, he maintains that the private search doctrine offers the Commonwealth no relief from the warrantless seizure of Appellant's laptop.
III. Analysis
A. Standard/Scope of Review
An appellate court's standard of reviewing the denial of a suppression motion is limited to determining whether the suppression court's factual findings are *969supported by the record and whether the legal conclusions drawn from those facts are correct. Commonwealth v. Yandamuri ,
B. Private Search Doctrine
We examine first the Commonwealth's assertion regarding applicability of the private search doctrine because if we determine that the doctrine applies, that conclusion would be dispositive of the appeal.
After being indicted on drug charges, the defendants filed a motion to suppress the evidence recovered from the package, contending that the warrant was the product of an illegal search and seizure. The district court denied suppression. The Court of Appeals reversed, holding that a warrant was required because the testing of the powder constituted a significant expansion of the earlier private search.
The High Court reversed, holding that "the federal agents did not infringe any constitutionally protected privacy interest that had not already been frustrated as a result of private conduct." Jacobsen ,
Categorizing the package as an "effect" in which an individual has a reasonable *970expectation of privacy, the Court observed that a warrantless search of the package would be presumptively unreasonable.
Significantly, the High Court explained that the additional invasions of privacy by the government agent "must be tested by the degree to which they exceeded the scope of the private search."
Regarding the government agent's reopening of the package after having been told by the employees that it contained a white powder, the Court emphasized that "there was a virtual certainty that nothing else of significance was in the package and that a manual inspection of the tube and its contents would not tell him anything more than he already had been told."
In the same vein, the Court ruled that the removal of the plastic bags from the tube and the visual inspection of the contents provided the agent with no more information than what had been discovered during the private search. Thus, the High Court opined, the agent's actions "infringed no legitimate expectation of privacy and hence was not a 'search' within the meaning of the Fourth Amendment."
The High Court proceeded to examine whether the agent's additional intrusion, occasioned by the field test of the white powder, exceeded the scope of the private search. The Court answered this inquiry in the negative, finding that the chemical test that merely disclosed whether a substance is cocaine did not compromise any legitimate interest in privacy as one cannot legitimately have a privacy interest in cocaine, an illegal substance.
Contrary to Appellant's assertion in his reply brief, there is ample support for the private search doctrine in Pennsylvania jurisprudence. This Court in Commonwealth v. Harris ,
In any event, while Appellant has claimed throughout this litigation that the unlawful search and seizure of his laptop violated both the Fourth Amendment and Article I, Section 8, he has not presented any claim that Article I, Section 8 provides greater protection to abandoned property or that our state counterpart to the Fourth Amendment should extend constitutional privacy protections to private searches under the circumstances here present. Thus, we analyze the case under Fourth Amendment jurisprudence.
C. Application of Private Search Doctrine
Initially, we readily acknowledge that the Commonwealth did not assert the private search doctrine during the suppression hearing and that the parties' arguments instead focused upon whether Appellant had a reasonable expectation of privacy in his laptop when he took the computer to CompuGig for repairs and consented to the replacement of his hard drive. However, we should not ignore governing Fourth Amendment jurisprudence by treating a private search, which is not entitled to constitutional protection, as though it were conducted by a government agent. Moreover, throughout this litigation, the Commonwealth was the nonmoving party or appellee and had no obligation *972to preserve the issue of whether the private search doctrine applied. See Rufo v. Bd. of License & Inspection Review , --- Pa. ----,
Pursuant to Jacobsen , our inquiry is two-fold: (1) whether the facts presented establish that a private search was conducted; and, if so, (2) whether the police actions exceeded the scope of the private search. Jacobsen ,
After discovering the contraband images, Eidenmiller then reported the child pornography to his supervisor, and a CompuGig administrative employee contacted the police. Id. at 7. In response, Officer Maloney proceeded to the CompuGig facility. The store owners then reiterated that Eidenmiller had found explicit images of young girls on Appellant's laptop and led Officer Maloney back to the computer repair room where Eidenmiller was located. Id. at 28. Officer Maloney then asked Eidenmiller to show him what he had found. The relevant testimony in this regard provides:
PROSECUTOR: What happened when you got to where the computer was?
OFFICER MALONEY: I spoke with the technician that found the items on the computer.
PROSECUTOR: Mr. Eidenmiller?
OFFICER MALONEY: Yes, Ma'am.
PROSECUTOR: And what was that conversation?
OFFICER MALONEY: I asked him what kind of images that he saw, what was on the computer, and I also asked him if he could show me what the images were.
PROSECUTOR: Did he do so?
OFFICER MALONEY: Yes.
PROSECUTOR: Did you view those images?
OFFICER MALONEY: I did, yes.
PROSECUTOR: And what were the images that you viewed?
OFFICER MALONEY: The images that I saw were of young females under the age of eighteen, some of them were under the age of I would say thirteen and sexually explicit positions.
PROSECUTOR: And once you viewed those what did you do?
OFFICER MALONEY: I had them shut down the file, and I asked him if there was anything else that needed to be done or anything else that he has and I seized everything.
N.T., 7/7/2016, at 29.
On cross-examination, defense counsel asked Officer Maloney whether Eidenmiller *973had to "do some clicking around to access the file." Id. at 30. Officer Maloney responded in the affirmative. Id. Defense counsel then inquired as to whether Eidenmiller opened the file at Officer Maloney's request. Id. Officer Maloney replied, "Yes, sir, he showed me the exact route taken to find the images." Id.
It has been Appellant's contention throughout these proceedings that when Officer Maloney requested to see the images that Eidenmiller had found while trying to repair Appellant's laptop, an illegal governmental search ensued in violation of his constitutional rights to privacy. Consistent with the High Court's decision in Jacobsen , we find this position unpersuasive as it ignores the context of Officer Maloney's request and the fact that CompuGig invited the officer into the establishment to view the very contraband that Officer Maloney asked Eidenmiller to disclose. See Jacobsen ,
Like the High Court in Jacobsen , we conclude that Officer Maloney's observation of what Eidenmiller voluntarily made known to him for his inspection after Officer Maloney was invited to the premises for the express purpose of viewing the contraband did not violate the Fourth Amendment because the private actor's viewing of the images extinguished Appellant's reasonable expectation of privacy in the images of child pornography. Thus, the subsequent police viewing of the contraband was not a "search" under the Fourth Amendment. See Coolidge v. New Hampshire ,
We next examine whether Officer Maloney's viewing of the images exceeded the search conducted by Eidenmiller. This inquiry is easily determined by the same passage of the suppression hearing testimony cited above. Officer Maloney testified that Eidenmiller showed him "the exact route taken to find the images,"
Accordingly, Officer Maloney did not exceed the scope of Eidenmiller's private search. As in Jacobsen , Officer Maloney's actions infringed upon no legitimate expectation of privacy and, hence, were not a "search" within the meaning of the Fourth Amendment. Also as in Jacobsen , Officer Maloney's assertion of dominion and control over Appellant's laptop, which contained the contraband images, constituted a "seizure," although it was not an unreasonable one as the privacy interest in the contraband images, the only information from the laptop revealed to the officer, had already been compromised by the private search. It should not be ignored that police subsequently obtained a warrant to view the remaining files on Appellant's laptop. See N.T., 7/7/2016, at 31 (providing that ten days after seizing Appellant's laptop, the police obtained a search warrant). As noted, supra at note 6, Appellant does not suggest that the police independently reviewed the remaining files on Appellant's laptop computer at a time prior to obtaining the warrant.
While not binding on this Court, we find persuasive the decisions of the federal circuit courts of appeals that have applied the Jacobsen construct to the private search of a computer in a similar manner. To illustrate, in United States v. Lichtenberger , supra , the defendant's girlfriend hacked into his computer, discovered thumbnail images of adults engaging in sexual acts with minors, and contacted the police. When an officer arrived at the residence, the girlfriend informed him that she hacked the computer belonging exclusively to the defendant and found child pornography. As occurred in the instant appeal, the officer then asked the girlfriend to show him what she had discovered. Unlike the instant case, however, the girlfriend displayed to the officer not only the images that she had recovered during the private search, but also displayed additional images of child pornography. The officer then directed the girlfriend to shut down the computer and seized it.
The defendant was later indicted on charges of child pornography and moved to suppress all evidence obtained pursuant to the officer's warrantless review of the laptop. The defendant contended that when the officer directed the girlfriend to show him what she had found, the girlfriend had become an agent of the government rendering the search impermissible under the Fourth Amendment. The government countered that the Officer's review of the images was valid under the private search doctrine as set forth in Jacobsen . The district court granted the defendant's suppression motion.
The Sixth Circuit Court of Appeals affirmed the district court's order granting suppression, but did so based only on the second prong of the Jacobsen test, finding that the police exceeded the scope of the private search. As an initial matter, the court concluded that the private search doctrine applied because the defendant's girlfriend acted solely as a private citizen when she searched the defendant's computer, invited the officer into the residence, and showed the officer what she had found. Pursuant to Jacobsen , the Court of Appeals agreed with the district court that the case presented an "after-the-fact confirmation of a private search." Id. at 484.
The Court of Appeals in Lichtenberger viewed the next inquiry under Jacobsen as whether the officer's search remained *975within the scope of the private search. Id. at 485. The court acknowledged how "searches of physical spaces and the items they contain differ in significant ways from searches of complex electronic devices under the Fourth Amendment." Id. at 487 (referencing Riley v. California , supra ). The court reasoned that the magnitude of private information retained in a computer manifested itself in Jacobsen 's requirement that the officer has to proceed with "virtual certainty" that the inspection of the laptop and its contents would not tell the police anything more than they had already learned from the individual who conducted the private search. Id. at 488. Stated differently, when the governmental viewing is limited to the scope of the private search, the magnitude of confidential files and information contained in one's computer is protected from the prying eyes of the government unless and until a warrant is obtained. Absent a warrant, the government may view only those files that were disclosed pursuant to the private search.
The Lichtenberger court found that this requirement was not satisfied because the officer admitted that he may have asked the girlfriend to open files that she had not previously opened during her private search. Id. Finding a lack of certainty that the officer's review was limited to the photographs discovered during the girlfriend's earlier private search, the Court of Appeals held that there was a real possibility that the officer exceeded that search and could have discovered other information on the defendant's laptop that was private, such as bank statements or personal communications unrelated to the allegations prompting the search. The court concluded that this discovery was precisely what the Jacobsen decision sought to avoid in articulating its beyond-the-scope test. Id. at 488-89.
The Lichtenberger court asserted that it was not alone in its approach to these modern considerations under the Fourth Amendment, as other circuit courts have placed a similar emphasis on "virtual certainty" in their application of Jacobsen to searches of contemporary electronic devices. Id. at 489-91 (citing United States v. Runyan , supra (holding that, under Jacobsen , police did not exceed the private search of defendant's computer disks where his ex-wife had privately searched them and found child pornography, but did exceed the scope of the private search when police examined disks not viewed during that private search as police had no "substantial certainty" regarding their contents); Rann v. Atchison , supra (applying Jacobsen to a subsequent police viewing of privately searched digital storage devices such as a memory card and computer zip drive that the victim of child pornography and her mother provided to police, and holding that police did not exceed the private search as they were "substantially certain" that the devices contained child pornography based upon the statements of the private parties); United States v. Tosti , supra (upholding an officer's viewing of contraband under Jacobsen where the computer technician repairing the defendant's computer disclosed to police thumbnail images containing child pornography and the police viewed only the images that the technician had already viewed)).
*976D. Conclusion
In the instant case, we have applied the High Court's accepted Jacobsen criteria and have concluded, based on the clear record, that Eidenmiller was not acting as an agent of the government when he discovered the thumbnail images of child pornography, and that Officer Maloney viewed only those images that Eidenmiller had presented to him based on Eidenmiller's private search. As Officer Maloney did not exceed the private search conducted by Eidenmiller, there is no violation of the Fourth Amendment under Jacobsen .
We clarify that we are not adopting the Commonwealth's position that one abandons his expectation of privacy in his computer files when he delivers his computer to a commercial retail establishment for repair. Further, we reject as inapplicable the narrower holding of the Superior Court in Sodomsky that one abandons his expectation of privacy when he consents to having the computer repaired in a manner that may result in the exposure of private information stored on the computer files. Instead, we hold that an individual's expectation of privacy at the moment he relinquishes his computer to a commercial establishment for repair is irrelevant to our constitutional analysis because the computer technicians examining the contents of the computer are private actors, not subject to the restrictions of the Fourth Amendment.
We observe that the ramifications of applying an abandonment theory to the facts presented are profound, as the abandonment theory, unlike the private search doctrine, lacks the constitutional safeguard of a restricted scope of the government's subsequent examination of the evidence discovered. Under an abandonment theory, the individual "checks his privacy interest at the door" when he requests a repair that may reveal the contents of private files stored on his computer. Once that expectation of privacy has been abandoned, there is no constitutional protection to be afforded, and the officer who responds to a report of child pornography found on a computer could potentially *977search every file on it without restriction. Applied to the facts presented, a true application of an abandonment theory would provide that when Officer Maloney arrived at CompuGig to view the images of child pornography found by Eidenmiller, he could have examined all of the files contained on Appellant's laptop, as any expectation of privacy in those files had been abandoned.
Under the private search doctrine, however, as explained supra , the officer responding to a report of child pornography found on a computer would be limited to viewing only those images revealed in the private search. Accordingly, application of the private search doctrine to the facts presented more narrowly tailors the scope of the governmental examination of the information revealed by the private search and offers greater protection of the privacy interests involved.
That is not to say that the application of the private search doctrine always affords greater protection. Where an unscrupulous computer technician takes it upon himself to peruse one's personal information contained in various files stored on the computer, unrelated to the requested repair, and that technician later finds and reports to law enforcement images of child pornography, the Fourth Amendment is not implicated so long as the police officer does not exceed the scope of the private search conducted. This unsavory result, however, is not the fault of the application of a flawed legal theory, but rather a consequence of the Fourth Amendment's guarantee against unreasonable searches by the government . For these reasons, we conclude that the abandonment rationale employed in Sodomsky has no application to searches conducted by private individuals.
Accordingly, we affirm the judgment of the Superior Court on these independent grounds.
Justices Todd, Dougherty and Mundy join the opinion.
Chief Justice Saylor files a dissenting opinion in which Justice Donohue joins.
Justice Wecht files a concurring and dissenting opinion.
As discussed in detail, infra , the High Court in United States v. Jacobsen ,
The exact contents of this conversation are unknown as the administrative employee who called Appellant did not testify at the suppression hearing. The record establishes, however, that Eidenmiller was told by CompuGig administration to continue working on the laptop because Appellant had consented to replacing the hard drive. Notes of Testimony ("N.T."), Suppression Hearing, 7/7/2016, at 17-18. Further, CompuGig's log indicated "Called customer to explain that we must do an OS Rebuild with data." Commonwealth Exhibit 2, at 2.
CompuGig's administrative log indicated a second communication between Appellant and CompuGig when, on November 30, 2015, Appellant had called CompuGig, purportedly to check on the status of his repair, and was given a quote of $250.50 to cover "New 500 Gig HDD," "Reinstall image," and "PE." Commonwealth Exhibit 2, at 3. The log further indicated that Appellant was in a rush to have the repair completed as he used the laptop for his business.
The record does not disclose the precise number of images that Eidenmiller found and displayed to Officer Maloney.
Detective Irvin did not testify at the suppression hearing; rather, Officer Maloney testified that Detective Irwin questioned Appellant and subsequently obtained a search warrant.
Appellant did not challenge the chain of custody of his laptop in his suppression motion or suggest that police searched the laptop after seizing it at CompuGig, but before obtaining a warrant.
Appellant did not argue in his suppression motion that Article I, Section 8 offers greater protection than the Fourth Amendment under the circumstances presented.
Judge Colville filed a concurring opinion in which he opined that he would not engage in a plain view analysis as the defendant's challenge fails because he lacked a reasonable expectation of privacy in the videos stored on his computer after he delivered the computer to Circuit City.
The Fourth Amendment to the United States Constitution provides that "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV.
Article I, Section 8 of the Pennsylvania Constitution provides that "[t]he people shall be secure in their persons, houses, papers and possessions from unreasonable searches and seizures, and no warrant to search any place or to seize any person or things shall issue without describing them as nearly as may be, nor without probable cause, supported by oath or affirmation subscribed to by the affiant. Pa. Const. art. I, § 8.
Appellant does not contend in his brief to this Court that Article I, Section 8 of the Pennsylvania Constitution offers any greater protection than the Fourth Amendment. Accordingly, we assume for purposes of argument that both provisions offer the same protection under the circumstances presented.
Any determination of whether Appellant retained a reasonable expectation of privacy in his laptop when he consented to the replacement of his hard drive presumes that it was the government who invaded his privacy by conducting the search. As explained infra , once it is determined that the search was conducted absent state action, the inquiry becomes whether the police exceeded the scope of the private search.
Officer Maloney explained that he seized Appellant's laptop, an external hard drive containing a copy of Appellant's hard drive, and the power cord. Id. at 31. Eidenmiller corroborated Officer Maloney's testimony regarding the conversation that occurred between the two men. See id. at 26 (responding in the affirmative when asked whether Officer Maloney asked Eidenmiller to display what he had found).
Additional federal circuit court decisions have applied the Jacobsen private search construct to searches of digital information stored on electronic devices. See e.g. United States v. Reddick ,
For this same reason, the federal cases of United States v. Jones ,
Additionally, under an abandonment theory the court would examine whether a reasonable person should have known that his private computer files would be revealed during the completion of a particular computer repair. As Appellant cogently argues herein, the disparity of knowledge of computer operability possessed by average citizens would render this determination difficult to resolve in many cases.
Dissenting Opinion
On the issue of abandonment, I agree with those courts which have held that a person does not abandon a reasonable expectation of privacy merely by turning a computer over to a repairperson to restore its functionality. See, e.g , United States v. Barth ,
Substantively, my thoughts align more closely with the majority's invocation of the private-search doctrine, since the present circumstances "significantly lessened [Appellant's] reasonable expectation of privacy 'by creating a risk of intrusion [by private parties] which [was] reasonable foreseeable."
Finally, to the degree that the private search doctrine applies, it would seem to me that it should only justify a viewing, by authorities, of files that already have been opened in the course of the private search. Here, however, police proceeded to seize Appellant's laptop from its place of entrustment without a warrant. See Majority Opinion, at 960-61. Other than relying on the concept of abandonment, the Commonwealth fails to identify an applicable exception to the warrant requirement to justify such seizure.
Concluding, as I do, that the case should turn on the abandonment question, and that Appellant did not completely abandon his expectation of privacy in closed computer files stored on his hard disk, I would reverse the order the Superior Court.
Justice Donohue joins this dissenting opinion.
Maj. Op. at 959-60 & n.1.
Dissenting Opinion
I concur only in the result that today's learned Majority reaches. The Majority chooses to invoke our discretionary authority to affirm an order upon any basis, and does so on the basis of the "private search" doctrine.
As the Majority aptly summarizes the history of the case,
The Commonwealth responded by arguing that Shaffer abandoned any expectation of privacy that he had in the computer. The Commonwealth relied primarily upon the Superior Court's decision in Commonwealth v. Sodomsky ,
On July 7, 2016, the trial court held a hearing on Shaffer's suppression motion. Following testimony from CompuGig employee John Eidenmiller and Officer Maloney, the inquiry focused primarily upon the applicability of Sodomsky . The trial court found that the facts of this case were close enough to those in Sodomsky that the court was bound to apply its rationale. However, the trial court disagreed with the Commonwealth's assertion that Shaffer abandoned his expectation of privacy the moment he delivered the computer to CompuGig. Instead, the trial court determined, it was not until Shaffer requested repairs that he abandoned any expectation that the contents of the computer would be kept private. At that point, Shaffer forfeited any right to challenge Officer Maloney's actions. Consequently, the trial court denied Shaffer's suppression motion, and, later sitting as the fact-finder, convicted Shaffer of the charges stemming from the images obtained from the computer.
Initially, what is most important is what did not occur during the suppression proceedings. At no point did the Commonwealth assert that Officer Maloney's actions with respect to the computer were constitutional due to an earlier private search. The Commonwealth placed all of its eggs into the Sodomsky basket (which addressed only whether a person has an expectation of privacy in these circumstances), and did not invoke the private search doctrine. The trial court ruled upon expectation of privacy grounds; it did not find that the search was a private one.
Shaffer had no reason to anticipate or rebut any argument that Officer Maloney's warrantless inquiry into the files on his computer was permissible as an extension of CompuGig's private search. More importantly, Shaffer had no opportunity to create a record to defend against such an argument. As the Majority explains, the applicability of the private search doctrine hinges principally upon whether the police officer exceeded the bounds of the private action already undertaken.
The case continued in the same character before the Superior Court, where the focus of the parties and the appellate panel remained upon Shaffer's expectation of privacy in the computer or his abandonment *980thereof. Once more, the Commonwealth did not raise the argument that the private search doctrine applied, and the Superior Court accordingly did not address that doctrine. The Superior Court held only that Shaffer had abandoned his expectation of privacy in the computer.
We granted allocatur to address the following question:
Does an individual give up his expectation of privacy in the closed private files stored on his computer, merely by taking his computer to a commercial establishment for service or repair, where the service or repair requested does not render the viewing of the citizen[']s closed private files as foreseeable to either the customer or the computer technician?
See Commonwealth v. Shaffer , --- Pa. ----,
The private search doctrine did not make any appearance in this case until it surfaced as the Commonwealth's third line of argument in its brief to this Court.
I. The Right-For-Any-Reason Doctrine
The "right-for-any-reason" doctrine "allows an appellate court to affirm the trial court's decision on any basis that is supported by the record." In re A.J.R.-H. , --- Pa. ----,
The rationale behind the "right for any reason" doctrine is that appellate review is of "the judgment or order before the appellate court, rather than any particular reasoning or rationale employed by the lower tribunal." Ario ,965 A.2d at 1200 (citing Hader v. Coplay Cement Mfg. Co. ,410 Pa. 139 ,189 A.2d 271 , 274-75 (Pa. 1953) ). As the United States Supreme Court has explained, "The reason for this rule is obvious. It would be wasteful to send a case back to a lower court to reinstate a decision which it had already made but which the appellate court concluded should properly be based on another ground within the power of the appellate court to formulate." Sec. & Exch. Comm'n v. Chenery Corp. ,318 U.S. 80 , 88,63 S.Ct. 454 ,87 L.Ed. 626 (1943).
Id. at 1176 (citations modified).
However jurisprudentially economical the use of the doctrine may be, an appellate court is not bound to utilize it any time it can scour the record and find another basis upon which to affirm. The doctrine *981is, and always has been, discretionary and prudential. See id. at 1176 ("This Court has stated that an appellate court may apply the right for any reason doctrine ....") (emphasis added); Commonwealth v. Wholaver ,
The principal restraint upon an appellate court's discretionary prerogative to apply the right-for-any-reason doctrine arises when the record does not contain a sufficient factual basis to support the new grounds for affirmance. As we explained most recently in In re A.J.R.-H. , an appellate court may apply the doctrine if "the established facts support a legal conclusion producing the same outcome. It may not be used to affirm a decision when the appellate court must weigh evidence and engage in fact finding or make credibility determinations to reach a legal conclusion." In re A.J.R.-H. , 188 A.3d at 1176 (citing Chenery Corp. ,
Thus, at the forefront of any inquiry into the propriety of the application of the right-for-any-reason doctrine is the question of whether the newly asserted basis for affirmance is "of record," i.e. , whether the basis is supported by the existing factual record. In conducting this inquiry, we should not ignore how the record in this case was created. At no point before or during the evidentiary hearing on Shaffer's motion did the Commonwealth raise the private search doctrine. Although the Commonwealth bears no issue-preservation duty as appellee, the arguments that it advanced in service of its initial burden at the suppression hearing played a significant role in the creation of the factual record.
At the heart of any private search doctrine analysis is the question of whether the police officer's subsequent actions exceeded those of the private citizen who conducted the first search.
I do not maintain that notice always is a necessary precondition to application of the right-for-any-reason doctrine. Rather, under circumstances such as those presented *982here, the manner in which the record is created is both an important factor in an appellate court's consideration of whether to apply the right-for-any-reason doctrine, and a significant factor in the crucial inquiry of whether the newly asserted basis for affirmance is "of record."
The sole inquiry from the outset of this case up to and through our grant of allocatur was whether Shaffer had an expectation of privacy in the laptop computer that he dropped off for repairs at CompuGig. That inquiry differs significantly from one assessing the private search doctrine. As a general matter, there are two essential elements that must be present before any search can be challenged constitutionally. The area searched must be an area in which the person challenging the search has a reasonable expectation of privacy, see Commonwealth v. Hawkins ,
To find a sufficient record basis for application of the private search doctrine, the Majority highlights a brief exchange between the Commonwealth's attorney and Officer Maloney, as well as two limited interactions between Shaffer's counsel and Officer Maloney.
A review of one aspect of those exchanges will illustrate my point. When Officer Maloney was on the stand, Shaffer's counsel asked him whether Eidenmiller, at the officer's request, opened the file containing the pornographic images. Officer Maloney responded, "Yes, sir, he showed me the exact route taken to find the images."
Moreover, the problem is not only that the issue is not "of record." The problem also is that it is inequitable to employ our discretionary authority to apply the right-for-any-reason doctrine here, inasmuch as the issue was thrust upon Shaffer only at this very late stage in the proceedings. When the Commonwealth raised the private search doctrine for the first time as its third argument in its brief to this Court, Shaffer was forced to respond to a new legal theory for the first time in his reply brief to this Court. Reply briefs, by rule, must be limited to 7000 words, and may not exceed fifteen pages.
The right-for-any-reason doctrine is premised primarily upon the desirability of conserving judicial and prosecutorial resources. Laudable as that goal may be, we still must be judicious in our exercise of discretion, and we should not wield that tool when it would impose upon one litigant an inequitable handicap. We should apply the doctrine only when the newly invoked basis for relief truly is of record, and where the applicability of that new basis is sufficiently clear, such that further proceedings on remand would be a waste of time and resources. That is not the case here.
There is another reason that I would not apply the right-for-any-reason doctrine in this case. As I discuss in greater detail in Part III below, Shaffer's judgment of sentence should be affirmed on the merits of the question upon which we actually granted allocatur . In other words, there is no reason to find an alternative basis to affirm when the case, as is, necessitates affirmance on the precise question presented.
II. The Private Search Doctrine
Before proceeding to the merits of the abandonment of privacy question presented by this case, I will assume for the moment that it would be an equitable exercise of our discretion to apply the right-for-any-reason doctrine; I do so in order to note my disagreement with the Majority's application of the private search doctrine.
The seminal case regarding the private search doctrine is the Supreme Court of *984the United States' decision in Jacobsen . In that case, a supervisor at an airport location of Federal Express noticed that a forklift had damaged a package. Jacobsen ,
As the Majority recounts, the Supreme Court considered the DEA agent's initial search as a private search because "the federal agents did not infringe any constitutionally protected privacy interest that had not already been frustrated as the result of private conduct."
This doctrine poses readily identifiable risks to an individual's right of privacy, and entails a considerable potential for abuse. The private search doctrine essentially places the state actor behind private eyes, allowing a law enforcement officer to go wherever a private person before him has gone. To cabin the potential hazard to privacy rights, the Supreme Court limited the subsequent governmental action to the bounds of the actions of the private individual. Any additional actions "must be tested by the degree to which they exceeded the scope of the private search."
More significant to the case sub judice , and as another limitation on the private search doctrine, the Supreme Court explained that the DEA's subsequent opening of the package did not exceed the parameters of the initial, private search because "there was a virtual certainty that nothing else of significance was in the package and that a manual inspection of the tube and its contents would not tell [the DEA agent] anything more than he already had been told." Id. at 119,
In Jacobsen , the DEA agent opened a package that contained a tube. In the tube were plastic bags containing cocaine. There was nothing else to find or discover. The DEA's re-examination of the package posed no additional threat to Jacobsen's privacy. It was "a virtual certainty" that the second search would reveal nothing but what the Federal Express employees had found and reported.
The same cannot be said for a personal computer. Regardless of the path taken by CompuGig's Eidenmiller to locate the suspicious files as directed by Officer Maloney, there existed a very real potential for exposure of information not yet discovered by the private search. In 2019, one's personal computer contains a wealth of information, both private and public. Even the screen saver, wallpaper, and names of files on the home screen of a computer can expose private information about the individual who owns the computer. Unlike a duct tape tube that has only one area where items can be stored, a personal *985computer offers virtually limitless areas for exploration. An inadvertent click on a file or tab could uncover to a state actor private information that was not part of the information collected initially by the private actor. Eidenmiller's navigation of a personal computer at the direction of a police officer does not entail the same "virtual certainty," or near guarantee, that no other private information could fall into the hands of the law enforcement agent in the same way that the tube in Jacobsen did. The tube in Jacobsen was a limited vessel, eliminating the possibility that the DEA agent would be able to exceed the bounds of the private search. Indeed, if the tube could be said to have an opposite, that opposite would be a personal computer.
Because nothing in the record as established in this case convincingly demonstrates a "virtual certainty" that Officer Maloney's second, warrantless search would not exceed the scope of the initial private search and would not reveal information other than what Eidenmiller already had discovered, I would find the private search doctrine to be inapplicable in this case in the event that the doctrine was properly before us.
That does not mean that I would reverse the lower courts. For the reasons that follow, I would hold that Shaffer ultimately, though not initially, abandoned his expectation of privacy in the computer.
III. Shaffer's Expectation of Privacy in the Personal Computer
We granted allocatur in this case to consider whether the owner of a personal computer abandons his or her expectation of privacy in closed files on that computer the moment he or she drops it off with a computer repair service. This question necessarily implicates the third-party doctrine. When we accepted this appeal, we provided ourselves with an opportunity to reconsider that doctrine in the context of our modern high-tech world, a world in which the interaction between technology and one's personal information has changed significantly from the past.
In Katz v. United States ,
The third-party doctrine addresses the question of whether a person's expectation of privacy applies when the object as to which the expectation is asserted is placed in the hands of a third person. Had this case been brought even a decade ago, its resolution as a matter of federal constitutional law would have been relatively straightforward. In United States v. Miller ,
*986Further, the records, in possession of a third party, could not be deemed exclusively private to Miller as they were "exposed to [bank] employees in the ordinary course of business."
In Smith , the Supreme Court addressed Smith's claim that he held a reasonable expectation of privacy in a pen register that recorded the outgoing numbers dialed from his landline telephone. The Court rejected Smith's claim, opining that it "doubt[ed] that people in general entertain any actual expectation of privacy in the numbers they dial." Smith ,
Under a reading of only Miller and Smith , it would appear that Shaffer could claim no legitimate expectation of privacy in his computer once he turned it over to CompuGig. By doing so, he would be deemed by those precedents voluntarily to have exposed the computer's contents to CompuGig's employees, who received the information in the regular course of their business. The argument would follow that Shaffer assumed the risk that a person working at CompuGig could turn any information found on the computer over to the police.
However, the jurisprudential landscape has evolved since the 1970's. A fair review of the United States Supreme Court's recent cases, beginning with United States v. Jones ,
Justice Scalia's majority opinion drew two concurrences relevant here. First, Justice Alito, joined by Justices Ginsburg, Breyer, and Kagan, rejected Justice Scalia's trespass-oriented approach to the case. These four Justices would have simply concluded that attachment of the GPS device to Jones' car was a search because it violated Jones' reasonable expectation of privacy through "the long-term monitoring of the movements of the vehicle he drove."
*987monitoring in investigations of most offenses impinges on expectations of privacy. For such offenses, society's expectation has been that law enforcement agents and others would not-and indeed, in the main, simply could not-secretly monitor and catalogue every single movement of an individual's car for a very long period."
Justice Sotomayor authored a concurring opinion in which she questioned whether the "Executive, in the absence of any oversight from a coordinate branch, [should have] a tool so amenable to misuse, especially in light of the Fourth Amendment's goal to curb arbitrary exercises of police power ...."
In Carpenter , the Supreme Court granted certiorari to determine "how to apply the Fourth Amendment to a new phenomenon: the ability to chronicle a person's past movements through the record of his cell phone signals."
In a majority opinion authored by Chief Justice Roberts, the Court declined to extend Miller 's and Smith 's strict third-party doctrine to preclude an expectation of privacy in the cellular tower records. The Court held first that, although Miller and Smith apply to phone numbers and bank records, the doctrine cannot apply automatically to the cellular tower records at issue. The core inquiry still must be whether society would deem reasonable an expectation of privacy in the area or items that were searched or seized. At the time that Miller and Smith were decided, few would have imagined a society so technologically advanced, or one in which citizens were so attached to electronic devices. Quoting Riley v. California ,
The Court also found it important that cellular towers do not merely log phone numbers. The towers in actuality compile a comprehensive and detailed record of a *988person's movements. These towers had generated "seismic shifts in digital technology that made possible the tracking of not only Carpenter's location but also everyone else's, not for a short period but for years and years."
That the records technically are compiled for commercial purposes cannot negate a person's expectation of privacy. In Carpenter , the government seized records encompassing one hundred and twenty-seven days of activity, "an all-encompassing record of the holder's whereabouts."
Rejecting a rote application of the third-party doctrine, as advocated by the Government and the dissenting Justices, the Carpenter Court explained that the doctrine is rooted in a "reduced" expectation of privacy; it does not mean that a person has no expectation of privacy at all. "[T]he fact of 'diminished privacy interests does not mean that the Fourth Amendment falls out of the picture entirely.' " Id. at 2219 (quoting Riley ,
In dissent, Justice Thomas expressed reservations as to the continued viability of the third-party doctrine, as Justice Sotomayor had done in her concurring opinion in Jones . In Justice Thomas' view, the Court approached the case incorrectly, inasmuch as the Court should not have contemplated at all whether a search occurred, but instead should have considered whose property was searched. Justice Thomas noted that the Fourth Amendment protects people from unreasonable searches of "their" places, property, and effects. Id. at 2235 (Thomas, J., dissenting). Thus, "each person has the right to be secure against unreasonable searches ... in his own person, house, papers, and effects." Id. (quoting Minnesota v. Carter ,
It is noteworthy that both Justices Thomas and Sotomayor have opined that the long standing third-party doctrine is no longer sustainable, albeit for different reasons. Nonetheless, what is important presently is that Carpenter itself provides the roadmap to resolving the expectation *989of privacy issue before us today. Foremost, Carpenter expressly rejected the notion that a person loses all expectation of privacy in an object immediately upon it landing in the hands of a third party. The Court emphasized that, while one may have a diminished expectation of privacy in that object, he or she does not invariably forfeit his or her expectation of privacy entirely. Examining Miller and Smith , the Court noted that what matters most was not that the materials at issue were in the hands of another, but rather "the nature of the particular documents sought" in ascertaining whether there existed a reasonable expectation of privacy in the contents searched or seized. Carpenter ,
In the modern digital age, personal computers and similar devices are quite like the cellular telephones at issue in Riley and the tracking of movements in Jones and Carpenter . Americans use these computing devices to aid in almost every aspect of their daily lives. We use them to get an education, to discuss politics and current events, to find a romantic partner, and to pay our bills. We store personal digital photographs on them, and engage in personal correspondence. We use computers for work, entertainment, and religion. We chronicle our lives with them. We shop with them. We pay our taxes with them. The personal computer, although not always carried everywhere we go like cell phones, has become equally important to the functioning of our daily lives. A search of a computer can provide the government with a complete snap-shot of a person's private life, revealing information related to every aspect of our lives, including those things we seek to keep most private. "An Internet search and browsing history, for example, can be found on an Internet-enabled [personal computer] and could reveal an individual's private interests or concerns-perhaps a search for certain symptoms of disease, coupled with frequent visits to WebMD." Riley ,
Personal computers, like modern cellular telephones, "are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans the privacies of life." Id. at 403,
Nonetheless, that Shaffer maintained some expectation of privacy even though he submitted the computer to CompuGig does not mean that Shaffer retained that expectation forever. It is axiomatic that a person who has an expectation of privacy also can abandon that expectation. Commonwealth v. Dowds ,
Presently, Shaffer's words and actions demonstrate clearly that he abandoned his expectation of privacy in the computer.
Shaffer provided CompuGig with his password, to allow CompuGig access to the computer, and he requested restorative services. Eidenmiller performed a basic diagnostic test, which revealed that the hard drive was failing. An administrator from CompuGig called Shaffer and told him of the results of this initial test. The administrator also informed Shaffer that the repairs would cost more than the initial estimate of $160. Shaffer told the administrator that, based upon the diagnostics, he wanted to replace the failing hard drive despite the increased cost. Shaffer then authorized further repairs. Shaffer made no efforts to limit CompuGig's access to any file or folder on the laptop.
*991Eidenmiller was not a party to that call, but he continued to work on the laptop. Acting on what he believed was Shaffer's request, Eidenmiller attempted to take an image of the hard drive and to place that image into a new hard drive. Although he successfully imaged the old hard drive, he was unable to insert that image onto a new hard drive. A CompuGig employee once more contacted Shaffer and told him of the failed attempt.
Eidenmiller then determined that the only other way to save the files on the defective hard drive was to manually copy the files and transfer them to the new hard drive one-by-one. CompuGig again contacted Shaffer and informed him that this was the last viable option to save the files. Shaffer consented to the work.
On these facts, Shaffer undeniably abandoned whatever expectation of privacy that he retained in the computer. Thus, by the time that Officer Maloney observed the pornographic photographs, Shaffer was unable to claim an expectation of privacy in the electronic folders in which they were stored. Having no such expectation, Shaffer is not entitled to suppression of those images.
* * *
Determination of whether a person has an expectation of privacy in an area searched is no easy task. It requires consideration of a number of factors, some of which are not always readily apparent. Police officers in the field make these decisions every day across Pennsylvania. Occasionally, and no doubt frustratingly, an appellate court will hold that an officer's estimation of a person's expectation of privacy was erroneous, leading to the suppression of evidence and, possibly, the dismissal of charges.
The risk of such an outcome often can be ameliorated by following the letter of our Constitutions and obtaining a search warrant when probable cause exists. It is true that an officer is not required to get a warrant to search an area in which the suspect has no expectation of privacy. However, simply because an officer is not required to get a warrant does not mean that he or she cannot (or should not) do so. To obtain a warrant is to provide the subsequent search with an added layer of protection from challenge, inasmuch as the search was authorized by a neutral and detached magistrate. Pre-approval of the search by a judicial officer eliminates the officer's need to make the much riskier decision of determining on the spot whether the subject has an expectation of privacy.
In some instances, it will be patent and obvious that the suspect has no expectation of privacy in the area that the officer seeks to search. However, this is not that case. CompuGig had sole possession of Shaffer's computer. An identified witness informed the police that he observed what he believed to be child pornography on the computer. Clearly, probable cause existed to obtain a warrant to search the computer. Instead of searching the computer immediately, the better (and more constitutionally adherent) practice is to secure the computer and proceed to get a warrant, thereby avoiding the risk of erroneously calculating whether Shaffer had an expectation of privacy.
* * *
For the reasons discussed, I concur in the result reached by the Majority. I dissent as to the Majority's legal analysis.
As Justice Wecht has amply demonstrated, many of the conceptual difficulties here arise from the shifting focus, at the present stage, from abandonment to the private search doctrine. See, e.g. Concurring and Dissenting Opinion at 979 ("Shaffer had no reason to anticipate or rebut any argument that Officer Maloney's warrantless inquiry into the files on his computer was permissible as an extension of CompuGig's private search."). In these circumstances, I respectfully differ with the majority's approach in faulting Appellant for failing to previously anticipate concerns and considerations relevant to the private search doctrine. See Majority Opinion, at 961 n.6.
Closer consideration of exceptions to the warrant requirement other than abandonment might be in order, had this case been developed by the Commonwealth so as to bring such exceptions into play in a timely fashion. Again, the Commonwealth does bear a substantial burden relative to warrantless seizures at a suppression hearing. See, e.g. , In re L.J. ,
Id. at 959-65.
In his brief to this Court, Shaffer invokes both the Fourth Amendment to the United States Constitution and Article I, Section 8 of the Pennsylvania Constitution. See Brief for Shaffer at 8. Shaffer does not provide an analysis pursuant to Commonwealth v. Edmunds ,
See Maj. Op. at 969-70 (citing United States v. Jacobsen ,
As the Majority correctly notes, the failure of the Commonwealth at any point to raise the issue does not amount to waiver of its right to raise it before us now. See Maj. Op. at 971-72 (citing Rufo v. Bd. of License & Inspection Review , --- Pa. ----,
See Brief for the Commonwealth at 17.
See Jacobsen ,
See Maj. Op. at 972-73.
N.T., 7/7/2016, at 30.
See Pa.R.A.P. 2135(a)(1).
The Majority chooses to resolve this case on the basis of the private search doctrine, concluding that "an individual's expectation of privacy at the moment he relinquishes his computer to a commercial establishment for repair is irrelevant to our constitutional analysis because the computer technicians examining the contents of the computer are private actors, not subject to the restrictions of the Fourth Amendment." Maj. Op. at 976. I disagree. If the expectation of privacy was irrelevant, then the Supreme Court of the United States' analyses in Smith (bank records) and Miller (pen register) would be irrelevant. In those cases, the Supreme Court held that the defendants could not challenge a subsequent search or seizure of the relevant materials because, once those materials were exposed to a third party, the defendants no longer retained an expectation of privacy in them. The Court did not predicate its holding that the seizures were constitutional on the rationale that the subsequent search did not exceed what was exposed to the third-parties. Moreover, if a person does not hold an expectation of privacy in an item being searched, then it does not matter whether the person performing the search is a private or state actor.
My perspective also is congruent with Pennsylvania's Article I, Section 8 third-party doctrine. See Commonwealth v. DeJohn ,
The Majority characterizes the application of an abandonment theory to the facts of this case as "profound," and observes that such a theory is less protective (in some instances) of privacy rights than is the private search doctrine. Maj. Op. at 976-77. To be sure, any time that the state obtains and exercises carte blanche authority to invade a person's effects, a profound act occurs, regardless of whether that search occurs because the person has given up any right to challenge the search or because the state actor is merely following the actions of a private citizen. It is true as well that the private search doctrine affords an extra layer of constitutional protection beyond that allowed by the traditional third-party doctrine, inasmuch as the latter necessarily entails an absolute abandonment of any and all privacy interests in the property or item provided to the third party, i.e. , the person "checks his privacy interest at the door." Id. at 976. I depart from the Majority because, as explained hereinabove, I would not apply the traditional third-party doctrine. The Supreme Court of the United States' case law has evolved to the degree that a person no longer categorically checks his privacy interest at the door, at least when the item now in the hands of a third party is a personal computer. Having retained some privacy in that personal computer, the owner may, by limiting access to certain areas of the device, retain some of his or her privacy interest in it. Put differently, with regard to her personal computer and similar devices, a person does not automatically grant access to all of the files stored anywhere on the computer simply by turning it over for service. Of course, as with Shaffer here, the facts of the case may demonstrate that the person intended to grant unfettered access to the entire computer.
Reference
- Full Case Name
- COMMONWEALTH of Pennsylvania, Appellee v. Jon Eric SHAFFER, Appellant
- Cited By
- 27 cases
- Status
- Published