This opinion will be unpublished and
may not be cited except as provided by
Minn. Stat. § 480A.08, subd. 3 (2012).
STATE OF MINNESOTA
IN COURT OF APPEALS
A14-0487
Chris Gregerson,
Appellant,
vs.
Hennepin County and Tracey Martin,
Respondents.
Filed October 6, 2014
Affirmed
Rodenberg, Judge
Hennepin County District Court
File No. 27-CV-13-10910
Chris Gregerson, New Richmond, Wisconsin (pro se appellant)
Michael O. Freeman, Hennepin County Attorney, Toni A. Beitz, Assistant County
Attorney, Minneapolis, Minnesota (for respondents)
Considered and decided by Schellhas, Presiding Judge; Worke, Judge; and
Rodenberg, Judge.
UNPUBLISHED OPINION
RODENBERG, Judge
Appellant Chris Gregerson challenges the district court’s grant of summary
judgment in favor of respondents Hennepin County and Tracey Martin and its denial of
appellant’s request to access data under the Minnesota Government Data Practices Act
(MGDPA). We affirm.
FACTS1
Appellant maintains a website of stock images that can be licensed or purchased as
prints. In 2005, appellant discovered that Vilana Financial, Inc. had used one of his
photographs without permission. Appellant sued Vilana Financial, Vilana Realty, Inc.,
and the companies’ principal shareholder, Andrew Vilenchik, for copyright infringement.
In 2008, the federal district court awarded appellant $19,462 in actual and statutory
damages for the unauthorized use of his photographs. Gregerson v. Vilana Financial,
Inc., No. 06-1164, 2008 WL 451060, at *10 (D. Minn. Feb. 15, 2008).
In 2009, appellant sued Vilana Financial, Vilenchik, Vladimir Kazaryan (a Vilana
employee), and their attorneys and law firms, alleging malicious prosecution, abuse of
process, and conspiracy. Hoping to uncover evidence to support his claims of malicious
prosecution against attorney Boris Parker, appellant settled his claims with Vilana and
Vilenchik, in exchange for Vilenchik’s promises to waive his attorney-client privilege
and to turn over correspondence with Parker. The district court later dismissed
appellant’s remaining claims. We affirmed the dismissal of appellant’s claims.
Gregerson v. Vilana Financial, Inc., No. A10-0863, 2010 WL 4451820, at *1 (Minn.
App. Nov. 9, 2010), review denied (Minn. Jan. 26, 2011).
In 2010, the Crystal police department obtained two search warrants to investigate
alleged criminal activities of Vilenchik and the Vilana corporations unrelated to
appellant’s claims. The first search warrant was issued on probable cause to believe that
1
We provide a detailed factual history leading up to the operative facts giving rise to
appellant’s claims to enable the reader to understand the context of appellant’s claims in
this case.
2
Vilana’s premises were being used as an unlicensed massage parlor and authorized a
search for massage therapy equipment, advertising materials related to massage therapy,
and “computers and peripherals used to place online advertising, produce advertising
materials or schedule client appointments.” The second search warrant was issued on
probable cause to believe that Vilenchik had engaged in theft by swindle in the sale of a
fake diamond and authorized a search for financial and other records relating to diamonds
and “computers and peripherals used to maintain financial transaction records of the
diamond sale or used in the production of fictitious . . . papers.”
When executing the two search warrants, Crystal police officers seized several
computers. A Hennepin County forensic computer examiner “imaged the hard drives of
sixteen of the seized computers so that [he] could conduct forensic analysis of their
contents, within the parameters specified in the search warrants.”2 The examiner then
used 35 key words provided to him by Crystal police officers to determine whether the
hard drives contained evidence relevant to the theft-by-swindle and unlicensed-massage-
parlor investigations. The key words did not include “Christopher Gregerson, Boris
Parker, Vladimir Kazaryan, Michael Walker, Michael Zubitskiy, McShane, or the topics
‘malicious prosecution,’ or copyright.” The examiner downloaded the results of his
analysis onto a disc and gave it to the Crystal police department.
In April 2011, appellant sent a subpoena to the Hennepin County Sheriff’s Office
(HCSO) requesting copies of the hard drives. In response, Assistant Hennepin County
2
Complete copies of the hard drives were made for examination and remain in evidence
storage at the Hennepin County Sheriff’s Office. The seized hard drives were then
returned to their owners.
3
Attorney Toni Beitz informed appellant that the subpoena was improper and that the
HCSO would not release a copy of the hard drives without a court order. Appellant then
informed Beitz that he “wished the HCSO to deem [his] subpoena to be a request
pursuant to the MGDPA.” Beitz denied appellant’s request to access the hard-drive
images because the Crystal police department’s criminal investigation was “still formally
not closed” and “all data is technically still confidential.” But Beitz also explained that
the HCSO would not provide appellant with the hard-drive images even after the
investigation was final.
In June 2012, appellant contacted Beitz to ask whether the criminal investigation
was complete and when the statute of limitations would expire. He narrowed his request
to any documents regarding Boris Parker, Morgan Smith, or himself, including e-mails
and recorded conversations between Vilenchik and Parker. Beitz responded that “the
criminal investigation still has not been officially closed” and that the statute of
limitations was “three years or longer.” Beitz also advised appellant to address any
future requests to the Crystal police department or to the HCSO’s responsible authority,
respondent Major Tracey Martin.
In September, appellant contacted Martin to request access to “any documents
(email, letters, etc.) contained on the seized hard drives which are to, from, or mention
Boris Parker” and “any audio recordings tha[t] include the voice of, or mention, Boris
Parker.” Appellant also requested any documents or recordings that mentioned himself,
Kazaryan, Walker, Zubitskiy, McShane, malicious prosecution, or copyright. Martin
denied appellant’s request for data and told appellant to address all future inquiries to the
4
City of Crystal because the HCSO “will not release any data without authorization from
the City of Crystal.”
In December, appellant made another request for data and requested “to be
informed if [he was] the subject of any of the data on the hard drive images identified in
[his] previous letter.” Martin again denied appellant’s request.
Appellant then sued respondents, alleging that “[he] is entitled to access or
receive, on an expedited basis, documents [he] requested from [respondents] under the
MGDPA.” Appellant requested the district court to (1) compel compliance with the
MGDPA, (2) grant declaratory relief, (3) authorize the disclosure of investigative data,
and (4) order that he “is entitled to have access to the data he requested in his MGDPA
requests” and compel respondents “to provide [him] with access to the requested data.”
Respondents moved for summary judgment, arguing that the district court could
not compel compliance with the MGDPA because appellant was seeking neither
government data nor investigative data under the MGDPA. Respondents also argued that
the requested information was protected under the United States and Minnesota
Constitutions. Appellant also moved for summary judgment, arguing that he was entitled
under the MGDPA to the data on the imaged hard drives that concerned him and his
dispute with Vilana and its affiliates. The parties agreed that there were no genuine and
material factual disputes.
The district court granted respondents’ motion for summary judgment and denied
appellant’s motion. The district court concluded that “the data requested by [appellant
do] not constitute ‘government data’ under the MGDPA,” nor were they “criminal
5
investigative data under the MGDPA.” Moreover, “a warrantless search of the data by
the HCSO, as requested by [appellant], would violate the Fourth Amendment and the
Minnesota Constitution.” As additional bases for denying appellant’s requested relief,
the district court noted that appellant failed to join Vilenchik as a party and failed to
demonstrate a bona fide legal interest because appellant was not entitled to the data. This
appeal followed.
DECISION
The MGDPA
regulates the collection, creation, storage, maintenance,
dissemination, and access to government data in government
entities. It establishes a presumption that government data
are public and are accessible by the public for both inspection
and copying unless there is federal law, a state statute, or a
temporary classification of data that provides that certain data
are not public.
Minn. Stat. § 13.01, subd. 3 (2012). “The purpose of the MGDPA is to reconcile the
rights of data subjects to protect personal information from indiscriminate disclosure with
the right of the public to know what the government is doing. The Act also attempts to
balance these competing rights within a context of effective government operation.”
KSTP-TV v. Ramsey Cnty., 806 N.W.2d 785, 788 (Minn. 2011) (quotation omitted).
The district court concluded that the MGDPA’s definition of “government data”
was ambiguous as applied here before concluding that “government data” means “only
the specific data collected by the Crystal [police department] for its criminal
investigation” and “used for a governmental purpose.” Appellant challenges the district
6
court’s determination that the data he requested were not “government data” under the
MGDPA.
We review the district court’s statutory interpretation of the MGDPA de novo.
KSTP-TV, 806 N.W.2d at 788; see also Schwanke v. Minn. Dep’t of Admin., 851 N.W.2d
591, 594 n.1 (Minn. 2014) (applying de novo review to the “legal question[s] of statutory
interpretation” when the MGDPA is unambiguous in context (quotation omitted)).
Our supreme court recently explained that “‘[d]ata’ are ‘facts that can be analyzed
or used in an effort to gain knowledge or make decisions’ or, more broadly, are
‘information.’” Schwanke, 2014 WL 3844200, at *2 (quoting The American Heritage
Dictionary of the English Language 462 (5th ed. 2011)). “Government data” are “all data
collected, created, received, maintained or disseminated by any government entity
regardless of [their] physical form, storage media or conditions of use.” Minn. Stat.
§ 13.02, subd. 7 (2012). Here, a government entity, the HCSO, collected and maintains
data that could be analyzed in the future with a proper warrant. Therefore, the data on the
imaged hard drives are “government data” under the MGDPA.3
Although the data are “government data,” we hold that appellant is not entitled to
receive copies of or search the hard drives for the information he seeks. Under the
MGDPA, government data can be “classified by statute, federal law, or temporary
classification as confidential, private, nonpublic, or protected nonpublic [data].” Id.,
3
Respondents do not dispute that appellant seeks “data” or that the HCSO is a
“government entity” under the MGDPA. They argue that the data are neither
“government data” nor “investigative data.”
7
subd. 8a; see also Minn. Stat. § 13.03, subd. 1 (2012) (explaining that government data
are public unless federal or state law classify the data as private or confidential).
“The United States and Minnesota Constitutions protect ‘the right of the people to
be secure in their persons, houses, papers, and effects, against unreasonable searches and
seizures.’” State v. Diede, 795 N.W.2d 836, 842 (Minn. 2011) (quoting U.S. Const.
amend. IV) (citing Minn. Const. art. I, § 10). “A search conducted without a warrant
issued upon probable cause is generally unreasonable.” State v. Flowers, 734 N.W.2d
239, 248 (Minn. 2007). A search “occurs upon an official’s invasion of a person’s
reasonable expectation of privacy. A reasonable expectation of privacy exists as to areas
and objects in which the person invoking the Fourth Amendment has a subjective
expectation of privacy that society is prepared to recognize as reasonable.” State v.
Johnson, 831 N.W.2d 917, 922 (Minn. App. 2013), review denied (Minn. Sept. 17, 2013).
But “the reasonableness of a person’s expectation of privacy is appraised on the basis of
the facts as they existed at the time the invasion occurred.” Id. at 923 (quotation
omitted).
In Johnson, police officers obtained a search warrant authorizing seizure of the
appellant’s computer hard drive to search for evidence of child pornography. Id. at 920.
An officer seized the appellant’s computer hard drive when executing the search warrant,
but the hard drive was not analyzed until seven months later. Id. The appellant argued
that the eventual forensic analysis amounted to a warrantless search. Id. at 920-21. We
explained that “a person has the same reasonable expectation of privacy in the concealed
digital contents of a cellular telephone [or computer hard drive] as a person has in the
8
concealed physical contents of a container.” Id. at 922 (quotation omitted). But “once
the government lawfully seizes a container during the execution of a warrant authorizing
the search of the container for particularly identified evidence, the owner’s expectation of
privacy in that evidence is frustrated.” Id. at 924 (quotation marks omitted). Because
there was no substantial likelihood that the appellant in that case had changed the
contents of the hard drive after it was seized and because the hard drive was searched
only for the evidence sought in the search warrant, the appellant did not have an
expectation of privacy in the material on the hard drive that was identified in the warrant.
Id.
Here, the two search warrants were issued based on probable cause to believe that
Vilana’s premises were being used as an unlicensed massage parlor and that Vilenchik
had engaged in theft by swindle. The warrants authorized only a search of the computer
drives for information related to those two specific crimes. As in Johnson, the Crystal
police officers lawfully seized the hard drives, which were the equivalent of “containers”
of the data sought by police. See id. “Therefore, the execution of the warrant[s]
‘frustrated’ and terminated [Vilenchik’s and Vilana’s] expectation of privacy in the hard
drive[s] and the digital contents identified in the warrant.” See id. (emphasis added). But
the execution of the warrants did not frustrate any expectation of privacy in other data
contained on the hard drives and not identified in the warrant. See United States v.
Carey, 172 F.3d 1268, 1270, 1276 (10th Cir. 1999) (explaining that police officers should
generally perform a keyword search of computer files for specific terms sought by the
search warrant, and suppressing evidence of child pornography on a computer hard drive
9
when the warrant authorized a search for evidence of drug trafficking). Any search of the
hard drives for the data appellant now seeks would be a warrantless search and would
invade Vilenchik’s reasonable expectation of privacy.4 See Johnson, 831 N.W.2d at 922.
Therefore, a search of the hard drives for the data appellant requested would violate the
Fourth Amendment rights of the owner(s) of the hard drives.
The United States Supreme Court recently held that police officers “must
generally secure a warrant” before searching the cell phones of recently arrested
individuals. Riley v. California, 134 S. Ct. 2473, 2485 (2014). Like the cell phones in
Riley, the hard drives here contain a large quantity of private information, which police
officers cannot lawfully search without a warrant. See id. at 2489, 2494-95 (explaining
that cell phones differ from other types of searchable containers because they contain
every piece of information about the individual for the past several months or more).
And, like the searches of the cell phones in Riley, there is no evidence that any exception
to the warrant requirement would justify a warrantless search of the hard drives for
appellant’s information. See id. at 2494 (explaining that “other case-specific exceptions
may still justify a warrantless search of a particular phone,” but that no such exceptions
applied). Contrary to appellant’s suggestion, a search of the hard drives is not equivalent
to an inventory search, see Colorado v. Bertine, 479 U.S. 367, 372, 107 S. Ct. 738, 741
(1987) (defining an inventory search), or a “one-time screening” of a President’s papers
as authorized by law, see Nixon v. Adm’r of Gen. Servs., 408 F. Supp. 321, 361 n.56
4
The district court observed that appellant should have joined Vilenchik as a party to this
lawsuit because the data on the hard drives that was not subject to the search warrants
belongs to him and his expectations of privacy in that data have not been disturbed.
10
(D.D.C. 1976) (allowing a warrantless search of President Nixon’s papers according to
federal law), aff’d, 433 U.S. 425, 97 S. Ct. 2777 (1977). The owner(s) of the data on the
hard drives continue(s) to have a reasonable privacy expectation in the data, except to the
extent of the warrants authorizing seizure of the drives for specific and limited purposes.
Making the data on the hard drives available for public inspection under the MGDPA
under these circumstances would be inconsistent with the constitutional principles
underlying Riley. Simply stated, the government collected data on the seized hard drives
but may not constitutionally access or inspect the data except as authorized by the
warrants.
Appellant has commendably briefed the issues, but his argument assumes that,
because the data are “government data” under the MGDPA, he is entitled to the data. But
appellant ignores the next step in the analysis. Because the owner(s) of the hard drives
continue(s) to have a reasonable expectation of privacy concerning all data on those hard
drives not authorized to be accessed by the search warrants, the data are either
“confidential data on individuals” or “protected nonpublic data.” See Minn. Stat. § 13.02,
subds. 3, 13 (2012). Federal constitutional law prohibits the seizure or inspection of the
contents of the data beyond the scope of the search warrants. Even if data concerning
appellant is contained on the hard drives collected by police officers pursuant to the
search warrants, those warrants did not authorize the government to search for or collect
that data. The reasonable expectation of privacy of the owner(s) of the hard drives in the
contents thereof has not been extinguished or overcome. We therefore hold that the data
11
not authorized by the search warrants to be accessed by the government are inaccessible
to appellant or any other person under the MGDPA.
Appellant also argues that the Fourth Amendment does not apply to a search
conducted by a private individual like himself. In United States v. Jacobsen, airport
employees examined a damaged package and discovered a white powdery substance,
which police officers later determined to be cocaine. 466 U.S. 109, 111, 104 S. Ct. 1652,
1655 (1984). The United States Supreme Court explained that “[t]he initial invasions of
respondents’ package were occasioned by private action” and that such private action
does not violate the Fourth Amendment. Id. at 115, 104 S. Ct. at 1657. Citing Jacobsen,
appellant argues that his private search of the hard drives cannot violate the Fourth
Amendment. But appellant asks the HCSO to conduct an additional search of the hard
drives for data beyond the scope of the search warrants. Such a search involves
government action, not private action, and triggers Fourth Amendment protection. See
id. at 113, 104 S. Ct. at 1656.
The district court did not err in granting summary judgment to respondents.
Affirmed.
12