The Fourth Amendment Right To Delete
The Fourth Amendment Right To Delete
The Fourth Amendment Right To Delete
Paul Ohm∗
For years the police have entered homes and offices, hauled away
filing cabinets full of records, and searched them back at the police
station for evidence. In Fourth Amendment terms, these actions are
entry, seizure, and search, respectively, and usually require the police
to obtain a warrant. Modern-day police can avoid some of these
messy steps with the help of technology: They have tools that duplicate
stored records and collect evidence of behavior, all from a distance and
without the need for physical entry. These tools generate huge
amounts of data that may be searched immediately or stored indefi-
nitely for later analysis. Meanwhile, it is unclear whether the Fourth
Amendment’s restrictions apply to these technologies: Are the acts of
duplication and collection themselves seizure? Before the data are
analyzed, has a search occurred?
Today, tools can detect heat released from buildings,1 recreate im-
ages displayed on distant computer monitors,2 determine what is typed
on a keyboard by listening to the distinct sounds of the keypresses,3
and eavesdrop on WiFi Internet communications traveling through the
air. Handheld GPS units can monitor and store our movements
around town,4 and web browsers keep detailed records of the websites
we have visited.5 Tomorrow will surely bring new tools that are more
invasive,6 easier to use, and able to work from greater distances.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
∗ Associate Professor, University of Colorado School of Law. Thanks to Pierre Schlag and
Phil Weiser for their helpful comments.
1 See Kyllo v. United States, 533 U.S. 27 (2001).
2 Allegedly, a technology called TEMPEST can capture and decode the radio emanations
leaving a computer monitor from afar in order to recreate the images displayed. See Christopher
J. Seline, Eavesdropping on the Compromising Emanations of Electronic Equipment: The Laws of
England and the United States, 23 CASE W. RES. J. INT’L L. 359, 361–62 (1991).
3 See Elizabeth Woyke, Is Someone Listening to Your Typing?, BUS. WK., Oct. 3, 2005, at 18.
4 See United States v. Bennett, 363 F.3d 947, 952 (9th Cir. 2004) (describing use of a seized
GPS unit’s “backtrack” feature to demonstrate that defendant’s boat had traveled from Mexico).
5 See Orin S. Kerr, Searches and Seizures in a Digital World, 119 HARV. L. REV. 531, 542
(2005).
6 In one sense, these technologies are less invasive: you have no idea you are being watched.
Having your keystrokes decoded is much less disruptive than having your living room turned up-
side down. Thanks to Pierre Schlag for this point.
10
2005] RIGHT TO DELETE 11
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
7 533 U.S. 27 (2001).
8 See id. at 27.
9 Kerr, supra note 5.
10 Id. at 550.
11 480 U.S. 321, 324 (1987).
12 Kerr, supra note 5, at 559.
13 Hicks, 480 U.S. at 324.
12 HARVARD LAW REVIEW FORUM [Vol. 119:10
The answer is yes; when an owner loses control of a copy of her data,
she loses the ability to dispose of or alter that data, which I contend
causes a form of seizure. This is analogous to the property right to de-
stroy, which is tied to the rights of dominion and control. The Fourth
Amendment prohibition on unreasonable seizure should protect these
rights and provide a constitutional right to delete.
The right to delete explains why imaging is seizure without requir-
ing Hicks to be overruled or otherwise conflicting with existing juris-
prudence.14 It will also help determine the Fourth Amendment status
of the ongoing data collection of heat emanations, keypresses, monitor
images, WiFi communications, GPS tracks, web browsing records, and
new technologies yet to be invented. Ultimately, a physical-property-
based reading of Fourth Amendment seizure fails to properly translate
the Amendment’s protections to intangible, digital property.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
14 In this essay, I am attempting to look at Fourth Amendment seizure and new technology in
a way that least disturbs existing case law. This is not an attempt to overhaul the theoretical un-
derpinnings of search and seizure in light of new technology.
15 See generally Lee Tien, Privacy, Technology, and Data Mining, 30 OHIO N.U. L. REV. 389
(2004).
16 See id. at 392 n.10.
17 Kerr, supra note 5, at 559.
2005] RIGHT TO DELETE 13
as both a search and a seizure.23 Perhaps the wiretap courts are being
sloppy, describing what is only a search as a seizure. But, more com-
pellingly, perhaps a seizure is not limited to physical dispossession. As
Professor Kerr points out, intangible computer data has a way of ex-
posing fissures in some of our bedrock understandings of the Fourth
Amendment.24
To determine whether the constitutional limit on unreasonable sei-
zure protects anything other than physical possessory interests, it helps
to ask the question, why is dispossession important? Cases like Hicks
view dispossession as a simple matter of rivalry: if you have my locked
box, I can’t have it too. But in the age of nonrivalrous, perfect digital
copying, this view of dispossession seems tautological and unhelpful.
The approach I suggest is to ask whether nonrivalrous copying can
produce similar negative effects to rivalrous dispossession. One nega-
tive effect of physical dispossession is it keeps the owner from altering,
destroying or otherwise changing the state of his property. If you take
my box full of letters, I am dispossessed of them, which harms me be-
cause I cannot give away, alter, or destroy them. I have lost the ability
to control my property. This not only diminishes the value of my
property, but it also invades my privacy.
The text of the Fourth Amendment seems broad enough to protect
this “right to destroy” or, in the computer context, “right to delete” by
its terms through its prohibition on unreasonable seizure. It is not
surprising that the Bill of Rights would protect such a right. There is
a long tradition of recognizing the right to destroy in property law. As
Lior Strahilevitz has discussed, at various times in legal history courts
have identified the right to destroy property as one of the “bundle of
rights” intrinsic to physical possession.25 This right is tied to the rights
of dominion and control. Although the right to destroy may seem cul-
turally or economically unsavory, it is protected because without the
extreme ability to change, delete, or destroy, virtually nothing will be
left of the rights of dominion and control.26 Furthermore, the right to
delete assures computer users that their words can be in some sense
undone. This provides a sense of privacy that may lead to more can-
dor in discussing sensitive matters electronically, and the increased
candor benefits all of society, not only the owners of the data.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
23 See, e.g., Katz, 389 U.S. at 353 (holding electronic voice surveillance to be a “search and sei-
zure”); Berger v. New York, 388 U.S. 41, 59 (1967) (“[T]he statute’s failure to describe with par-
ticularity the conversations sought gives the officer a roving commission to ‘seize’ any and all
conversations.”).
24 Kerr, supra note 5, at 533–34.
25 Lior Strahilevitz, The Right To Destroy, 114 YALE L.J. 781, 794 (2005).
26 See id. at 794–95 (describing the right to destroy as an extreme version of the rights to ex-
clude, use, and control subsequent alienation).
2005] RIGHT TO DELETE 15
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
32 The Fourth Amendment may not forbid every interference with the right to delete. Follow-
ing the Hicks test, the test should be: has there been a meaningful interference with the right to
delete?
Imagine the police use a computer program that scans Internet traffic for particular text
strings. If they find a match, a search has occurred. But it is arguable that the program has not
seized every single packet flowing through the program. Although the user lost the ability to de-
lete his communications during the fraction of a second that they were held by the program, this
de minimis interference with the right to delete would not rise to the level of seizure. This tempo-
ral component and other questions of scope suggest future work beyond the scope of this essay.
Nevertheless, any definition of “meaningful interference with the right to delete” and any tempo-
ral requirements are met when the police image and keep a copy of a hard drive.
33 See Bills v. Aseltine, 958 F.2d 697, 707 (6th Cir. 1992). Photographing items in plain view
allows much greater police scrutiny. On the other hand, the police could instead remain on the
scene, studying every minute detail; the photograph helps avoid this greater intrusion, but in re-
turn, allows for a more searching inquiry.
34 See United States v. McIver, 186 F.3d 1119, 1128 (9th Cir. 1999); cf. United States v. Knotts,
460 U.S. 276, 281 (1983) (“A person traveling in an automobile on public thoroughfares has no
reasonable expectation of privacy in his movements from one place to another.”).
35 Arizona v. Hicks, 480 U.S. 321, 327 (1987).
2005] RIGHT TO DELETE 17