Advanced Search
MyIDEAS: Login to save this paper or follow this series

Legal Protection for Conversational and Communication Privacy in Family, Marriage and Domestic Disputes: An Examination Federal and State Wiretap and Stored Communications Acts and the Common Law Privacy Intrusion Tort

Contents:

Author Info

  • Richard Turkington

    (Villanova University School of Law)

Registered author(s):

    Abstract

    In the article I examine the legality of the not uncommon practice of surreptitiously recording telephone conversations, videotaping activities and accessing e-mail or voicemail communications by parties in domestic disputes. First, I examine the important values that are implicated by such activities. These values include conversation, communication and physical privacy. Conversation (and communication) privacy are valued on both intrinsic and instrumentalist grounds. These values run into countervailing values in domestic conflict cases. These include parental autonomy in child rearing and the best interests of the child. I argue that the pervasiveness of electronic surveillance and the emerging tradition in our legal system to grant "mature minors" self-determination in respect to decisions traditionally left to parents need to count more in accommodating values in parental electronic surveillance cases. Section II examines the legality of electronic surveillance in domestic disputes under federal and state wiretap and stored communications acts and the common law privacy intrusion tort. Wiretap and stored communications acts are notorious for their lack of clarity. I endeavor in part of this section to lay foundations about the basic concepts and structure of these laws and identify areas where there is some clarity. Wiretap acts generally prohibit surreptitious electronic surveillance of conversations. However, electronic surveillance in domestic disputes may be legal if the surveillance is sanctioned under three exceptions. These are: (1) the marital conflict exception; (2) the telephone extension exception; and (3) the vicarious consent exception. I join other commentators in their criticism of the first two exceptions. The vicarious consent exception is of recent vintage and I argue that the exception ought to be junked for several reasons. These include inherent problems with the parental motive tests, the incomprehensibility of vicarious consent with the modern law of joint custody, and the non-identity of interests in parental electronic surveillance cases. I also suggest that the problems with the self-minimization role granted to parents under the vicarious consent exception is another reason to junk the defense. Access to e-mail and voicemail are regulated under federal and state stored communications acts. Unlike wiretap acts these statutes do not contain exclusionary rules and the fruits of violations of stored communications acts are still admissible in civil and criminal proceedings. Courts have construed stored communication acts to not apply to surreptitious access of e-mail and voicemail from computers in the home. In addition, silent video surveillance is not regulated under wiretap or stored communications acts. This development has elevated the role of the common law privacy intrusion tort in legal evaluation of access to e-mail in home computers and surreptitious video surveillance in the home. It is clear that surreptitious audio and video surveillance in domestic conflicts may constitute tortuous conduct even if the conduct does not violate wiretap or stored communications acts. I examine the extent to which parties may have reasonable expectations of privacy in conversations and communications within the meaning of the privacy intrusion tort. I conclude that it would be tortuous conduct for a spouse to access e-mail stored in a home computer if the e-mail is stored in a segregated account and the parties have maintained separate passwords. Much evidence that is obtained by illegal electronic surveillance maybe admissible in marriage and custody proceedings because violations of stored communications acts and the privacy intrusion tort do not provide a basis for excluding evidence in civil court proceedings. I suggest that protective orders based upon discovery rules and constitutional privacy rights may provide a way to protect privacy by excluding some communications or images from admissibility in judicial records.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://law.bepress.com/cgi/viewcontent.cgi?article=1010&context=villanovalwps
    Download Restriction: no

    Bibliographic Info

    Paper provided by Villanova University School of Law in its series Villanova University Legal Working Paper Series with number villanovalwps-1010.

    as in new window
    Length:
    Date of creation:
    Date of revision:
    Handle: RePEc:bep:villwp:villanovalwps-1010

    Contact details of provider:
    Web page: http://www.law.vill.edu/

    Related research

    Keywords:

    This paper has been announced in the following NEP Reports:

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:bep:villwp:villanovalwps-1010. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Christopher F. Baum).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.