Applying the analysis and principles announced in O’Connor and Simons to the case at bar, we now address the following questions: (1) Did petitioner have a reasonable expectation of privacy in his office and computer files?; and (2) Was the search authorized by the CSC Chair, the copying of the contents of the hard drive on petitioner’s computer reasonable in its inception and scope?
In this inquiry, the relevant surrounding circumstances to consider include “(1) the employee’s relationship to the item seized; (2) whether the item was in the immediate control of the employee when it was seized; and (3) whether the employee took actions to maintain his privacy in the item.” These factors are relevant to both the subjective and objective prongs of the reasonableness inquiry, and we consider the two questions together. Thus, where the employee used a password on his computer, did not share his office with co-workers and kept the same locked, he had a legitimate expectation of privacy and any search of that space and items located therein must comply with the Fourth Amendment.
Petitioner failed to prove that he had an actual (subjective) expectation of privacy either in his office or government-issued computer which contained his personal files. Petitioner did not allege that he had a separate enclosed office which he did not share with anyone, or that his office was always locked and not open to other employees or visitors. Neither did he allege that he used passwords or adopted any means to prevent other employees from accessing his computer files. On the contrary, he submits that being in the public assistance office of the CSC-ROIV, he normally would have visitors in his office like friends, associates and even unknown people, whom he even allowed to use his computer which to him seemed a trivial request. He described his office as “full of people, his friends, unknown people” and that in the past 22 years he had been discharging his functions at the PALD, he is “personally assisting incoming clients, receiving documents, drafting cases on appeals, in charge of accomplishment report, Mamamayan Muna Program, Public Sector Unionism, Correction of name, accreditation of service, and hardly had anytime for himself alone, that in fact he stays in the office as a paying customer.” Under this scenario, it can hardly be deduced that petitioner had such expectation of privacy that society would recognize as reasonable.
Moreover, even assuming arguendo, in the absence of allegation or proof of the aforementioned factual circumstances, that petitioner had at least a subjective expectation of privacy in his computer as he claims, such is negated by the presence of policy regulating the use of office computers, as in Simons.
The CSC in this case had implemented a policy that put its employees on notice that they have no expectation of privacy in anything they create, store, send or receive on the office computers, and that the CSC may monitor the use of the computer resources using both automated or human means. This implies that on-the-spot inspections may be done to ensure that the computer resources were used only for such legitimate business purposes.
As to the second point of inquiry on the reasonableness of the search conducted on petitioner’s computer, we answer in the affirmative.
The search of petitioner’s computer files was conducted in connection with investigation of work-related misconduct prompted by an anonymous letter-complaint addressed to Chairperson David regarding anomalies in the CSC-ROIV where the head of the Mamamayan Muna Hindi Mamaya Na division is supposedly “lawyering” for individuals with pending cases in the CSC.
A search by a government employer of an employee’s office is justified at inception when there are reasonable grounds for suspecting that it will turn up evidence that the employee is guilty of work-related misconduct.
Under the facts obtaining, the search conducted on petitioner’s computer was justified at its inception and scope (Pollo v. Constantino-David, G.R. No. 181881. October 18, 2011).
No comments:
Post a Comment