US Business Law Analysis Paper

If you have ever been stuck in a traffic jam or jostled in a crowd leaving a stadium, you have observed the need for order to keep those involved moving in an efficient and safe manner. The interruptions and damages from Internet viruses demonstrate the need for rules and order in this era of new technology. When our interactions are not orderly, whether at our concerts or through our e-mail, all of us and our rights are affected. The order or pattern of rules that society uses to govern the conduct of individuals and their relationships is called law. Law keeps society running smoothly and efficiently.

1. Legal Rightsright – legal capacity to require another person to perform or refrain from an action. duty – an obligation of law imposed on a person to perform or refrain from performing a certain act.

A right is a legal capacity to require another person to perform or refrain from performing an act. Our rights flow from the U.S. Constitution, state constitutions, federal and state statutes, and ordinances at the local levels, including cities, counties, and boroughs. Within these sources of rights are also duties. A duty is an obligation of law imposed on a person to perform or refrain from performing a certain act. Duties and rights coexist. No right exists in one person without a corresponding duty resting on some other person or persons. For example, if the terms of a lease provide that the premises will remain in a condition of good repair so that the tenant can live there comfortably, the landlord has a corresponding dutyto provide a dwelling that has hot and cold running water.

2. Individual RightsThe U.S. Constitution gives individuals certain rights. Those rights include the right to freedom of speech, the right to due process or the right to have a hearing before any freedom is taken away, and the right to vote. There are also duties that accompany individual rights, such as the duty to speak in a way that does not cause harm to others. For example, individuals are free to express their opinions about the government or its officials, but they would not be permitted to yell “Fire!” in a crowded theater and cause unnecessary harm to others. The rights given in the U.S. Constitution are rights that cannot be taken away or violated by any statutes, ordinances, or court decisions. These rights provide a framework for the structure of government and other laws.

3. The Right of PrivacyOne very important individual legal right is the right of privacy, which has two components. The first is the right to be secure against unreasonable searches and seizures by the government. The Fourth Amendment of the U.S. Constitution

Copyright 2010 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.

Licensed to: iChapters UserChapter 1 The Nature and Sources of Law 5

right of privacy – the right to be free from unreasonable intrusion by others.

guarantees this portion of the right of privacy. A police officer, for example, may not search your home unless the officer has a reasonable suspicion (which is generally established through a warrant) that your home contains evidence of a crime, such as illegal drugs. If your home or business is searched unlawfully, any items obtained during that unlawful search could be excluded as evidence in a criminal trial because of the Fourth Amendment’s exclusionary rule.

For Example, in the murder trial of O.J. Simpson, Judge Lance Ito excluded some of the evidence the police had obtained from inside Mr. Simpson’s Ford Bronco, which was parked on the street outside his home. Judge Ito ruled that the officers should have first obtained a warrant for the locked vehicle, which was not going to be taken anywhere because Mr. Simpson was out of town at that time.

When Warrants Are Involved, No Brief PhotographsFACTS: In the early morning hours of April 16, 1992, a special team of Deputy U.S. Marshals and police officers executed warrants that had been issued against Dominic Wilson, who was wanted for robbery, theft, and assault and who had a “use caution” warning posted on law enforcement files and records. The team was accompanied by a reporter and a photographer from the Washington Post, who had been invited by the marshals to accompany them as part of a Marshals Service ride-along policy. The officers, with media representatives in tow, entered the dwelling noted in the warrant at 6:45 A.M.

The home they entered and that was on the arrest warrant actually belonged to Dominic’s parents, Charles and Geraldine Wilson. Charles and Geraldine were still in bed. When they heard the officers enter the home, Charles Wilson, dressed only in a pair of briefs, ran into the living room to investigate. He angrily cursed the officers. Geraldine Wilson then entered the living room to investigate, wearing only a nightgown. She observed her husband being restrained by the armed officers. Dominic Wilson was not in the house, and the officers left.

However, the Washington Post photographer had already taken numerous pictures of the confrontation between the police and Charles Wilson. The Washington Post never published its photographs of the incident. The Wilsons filed suit against the officers for invasion of their privacy and violation of their Fourth Amendment rights. The district court found that the officers could be held liable.

The Court of Appeals reversed and found that the officers had immunity. The U.S. Supreme Court granted certiorari because of several conflicting circuit decisions on the issue of cameras and reporters being present during arrests and warrant executions. DECISION: The Court held that although there were reasons for having the reporters and cameras present, such as public relations, safety for officers, and assistance, those reasons were notsufficient enough to disregard the Fourth Amendment rights of the homeowners.

Citing “a man’s home is his castle,” the Court noted the longstanding history of protecting individuals in their homes. The Court held that having reporters and photographers along in the execution of a warrant is a violation of the Fourth Amendment rights of the parties being searched. Officers can be subject to some liability for their failure to honor privacy protections. [Wilson v Layne, 526 US 603 (1999)]1

Police officers who record the arrest of a DUI suspect have not violated the suspect’s privacy, State v Morris, 214 P 3d 883 (UT App 2009).

Copyright 2010 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.

Licensed to: iChapters User6 Part 1 The Legal and Social Environment of Business

A second aspect of the right of privacy protects individuals against intrusions by others. Your private life is not subject to public scrutiny when you are a private citizen. This right is provided in many state constitutions and exists through interpretation at the federal level in the landmark case of Roe v Wade,2 in which the U.S. Supreme Court established a right of privacy that gives women the right to choose whether to have an abortion. These two components of the right to privacy have many interpretations. These interpretations are often found in statutes that afford privacy rights with respect to certain types of conduct.

For Example, a federal statute provides a right of privacy to bank customers that prevents their banks from giving out information about their accounts except to law enforcement agencies conducting investigations. Some laws protect the rights of students. For Example, the Family Educational Rights and Privacy Act of 1974 (FERPA, also known as the Buckley Amendment) prevents colleges and universities from disclosing students’ grades to third parties without the students’ permission. From your credit information to your SocialSecurity number, you have great privacy protections.

4. Privacy and TechnologyTechnology creates new situations that may require the application of new rules of law. Technology has changed the way we interact with each other, and new rules of law have developed to protect our rights. Today, business is conducted by computers, wire transfers of funds, e-mail, electronic data interchange (EDI) order

Googling Job ApplicantsA recent survey shows a new component in the background searches performed by potential employers of job applicants: ●

61 percent of professional service firms, including accounting, consulting, engineering, and law firms, do Google searches on their job candidates. Fifty percent of professional services hired by employers to do background checks use Google.

Such a search. Experts tell college students to remember that what may seem to be something noncontroversial in your youth can later come back to haunt you when you begin your professional career. Their advice is to watch what you put in MySpace, Facebook, and all other Internet sites. Discuss privacy rights and whether there is any legal issue when information is posted voluntarily on the Internet. Is there an ethical issue with these types of searches? Source: Sandhya Bathija , “Have a Profile on MySpace? Better Keep It Clean,” National Law Journal, June 4, 2007, 10.

One employer commented that a Google search is so simple that it would be irresponsible not to conduct.

Copyright 2010 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.

Licensed to: iChapters UserChapter 1 The Nature and Sources of Law 7

placements, and the Internet. We still expect that our communication is private. However, technology also affords others the ability to eavesdrop on conversations and intercept electronic messages. The law has stepped in to reestablish that the right of privacy still exists even in these technologically nonprivate circumstances. Some laws now make it a crime and a breach of privacy to engage in such interceptions of communications.3 (See Chapter 11)

Employers, E-mail, and PrivacyScott Kennedy, a computer system administrator for Qualcomm Corporation in San Diego, California, discovered that somebody had obtained unauthorized access (or “hacked into,” in popular parlance) the company’s computer network. Kennedy contacted the Federal Bureau of Investigation (FBI). Working together, Kennedy and the FBI were able to trace the intrusion to a computer on the University of Wisconsin at Madison network. They contacted Jeffrey Savoy, the University of Wisconsin computer network investigator, who found evidence that someone using a computer on the university network was in fact hacking into the Qualcomm system and that the user had gained unauthorized access to the university’s system as well. Savoy traced the source of intrusion to a computer located in university housing,

The room of Jerome Heckenkamp, a computer science graduate student at the university. Savoy knew that Heckenkamp had been terminated from his job at the university computer help desk two years earlier for similar unauthorized activity. While Heckenkamp was online and logged into the university’s system, Savoy, along with detectives, went to Heckenkamp’s room. The door was ajar, and nobody was in the room.

Savoy entered the room and disconnected the network cord that attached the computer to the network. In order to be sure that the computer he had disconnected from the network was the computer that had gained unauthorized access to the university server, Savoy wanted to run some commands on the computer.

Detectives located Heckenkamp, explained the situation, and asked for Heckenkamp’s password, which Heckenkamp voluntarily provided. Savoy then ran tests on the computer and copied the hard drive without a warrant. When Heckenkamp was charged with several federal computer crimes, he challenged the university’s access to his account and Savoy’s steps that night, including the copy of the hard drive, as a breach of his privacy. Was Heckenkamp correct? Was his privacy breached? [U.S. v Heckenkamp, 482 F3d 1132 (CA 9 2007).] constitution – a body of principles that establishes the structure of a government and the relationship of the government to the people who are governed.