All of us nowadays use our computers almost all through the day. For work or non-work purposes. While doing this, many people confide their deepest secrets to their computers. Would you want everything you have ever typed into your computer to be revealed publicly?
Forensic computer investigators in President Clinton’s impeachment case discovered damaging evidence on the hard drive of Monica Lewinsky’s computer.
They discovered evidence she clearly thought was very secret and completely private, including copies of deleted e-mails and drafts of letters she had never sent.
Considering what happened in this famous case, what protection do you have for information stored on your computer?
The US Constitution and general principles of criminal law, prohibit unreasonable searches and seizures by official bodies.
In enforcing the provisions of the constitution and the law, the courts normally ask, did the person being searched have a legitimate expectation of privacy in the place searched or the item seized?
If yes, then the official bodies must obtain a warrant from a court before conducting the search.
Example of another US case, XYZ worked for a public corporation, which notified its employees that they could use their computer only for official business and the corporation would conduct electronic audits to ensure compliance.
While monitoring the system, they discovered that XYZ had illegally downloaded child pornography from the Internet onto his official computer.
Investigators, operating without a warrant, reviewed and copied all picture files XYZ had downloaded.
He was convicted of receiving child pornography and sentenced to 18 months in prison.
On appeal, he alleged that the search was illegal because it had been conducted without a warrant.
The court held that, in light of the public corporation’s announced policy, XYZ did not have reasonable expectation of privacy in the files downloaded from the Internet.
His conviction stood.
Apart from the difficulties that could arise in forensic evidence such crimes are increasing daily.
Take utmost care while using your friend’s computer as it could easily turn against you and be your deaf, blind and mute enemy.
Your deleted messages could be retrieved, photos could be brought back, old drafts could be found.
You don’t see them, you believe they have gone with the wind. No, they are hiding somewhere in the cyber space which you don’t see while others do.
The author is a legal consultant. He can be reached at email@example.com