Chris Gregerson v. Hennepin County and Tracey Martin

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. § 480A.08, subd. 3 (2012). STATE OF MINNESOTA IN COURT OF APPEALS A14-0487 Chris Gregerson, Appellant, vs. Hennepin County and Tracey Martin, Respondents. Filed October 6, 2014 Affirmed Rodenberg, Judge Hennepin County District Court File No. 27-CV-13-10910 Chris Gregerson, New Richmond, Wisconsin (pro se appellant) Michael O. Freeman, Hennepin County Attorney, Toni A. Beitz, Assistant County Attorney, Minneapolis, Minnesota (for respondents) Considered and decided by Schellhas, Presiding Judge; Worke, Judge; and Rodenberg, Judge. UNPUBLISHED OPINION RODENBERG, Judge Appellant Chris Gregerson challenges the district court’s grant of summary judgment in favor of respondents Hennepin County and Tracey Martin and its denial of appellant’s request to access data under the Minnesota Government Data Practices Act (MGDPA). We affirm. FACTS1 Appellant maintains a website of stock images that can be licensed or purchased as prints. In 2005, appellant discovered that Vilana Financial, Inc. had used one of his photographs without permission. Appellant sued Vilana Financial, Vilana Realty, Inc., and the companies’ principal shareholder, Andrew Vilenchik, for copyright infringement. In 2008, the federal district court awarded appellant $19,462 in actual and statutory damages for the unauthorized use of his photographs. Gregerson v. Vilana Financial, Inc., No. 06-1164, 2008 WL 451060, at *10 (D. Minn. Feb. 15, 2008). In 2009, appellant sued Vilana Financial, Vilenchik, Vladimir Kazaryan (a Vilana employee), and their attorneys and law firms, alleging malicious prosecution, abuse of process, and conspiracy. Hoping to uncover evidence to support his claims of malicious prosecution against attorney Boris Parker, appellant settled his claims with Vilana and Vilenchik, in exchange for Vilenchik’s promises to waive his attorney-client privilege and to turn over correspondence with Parker. The district court later dismissed appellant’s remaining claims. We affirmed the dismissal of appellant’s claims. Gregerson v. Vilana Financial, Inc., No. A10-0863, 2010 WL 4451820, at *1 (Minn. App. Nov. 9, 2010), review denied (Minn. Jan. 26, 2011). In 2010, the Crystal police department obtained two search warrants to investigate alleged criminal activities of Vilenchik and the Vilana corporations unrelated to appellant’s claims. The first search warrant was issued on probable cause to believe that 1 We provide a detailed factual history leading up to the operative facts giving rise to appellant’s claims to enable the reader to understand the context of appellant’s claims in this case. 2 Vilana’s premises were being used as an unlicensed massage parlor and authorized a search for massage therapy equipment, advertising materials related to massage therapy, and “computers and peripherals used to place online advertising, produce advertising materials or schedule client appointments.” The second search warrant was issued on probable cause to believe that Vilenchik had engaged in theft by swindle in the sale of a fake diamond and authorized a search for financial and other records relating to diamonds and “computers and peripherals used to maintain financial transaction records of the diamond sale or used in the production of fictitious . . . papers.” When executing the two search warrants, Crystal police officers seized several computers. A Hennepin County forensic computer examiner “imaged the hard drives of sixteen of the seized computers so that [he] could conduct forensic analysis of their contents, within the parameters specified in the search warrants.”2 The examiner then used 35 key words provided to him by Crystal police officers to determine whether the hard drives contained evidence relevant to the theft-by-swindle and unlicensed-massage- parlor investigations. The key words did not include “Christopher Gregerson, Boris Parker, Vladimir Kazaryan, Michael Walker, Michael Zubitskiy, McShane, or the topics ‘malicious prosecution,’ or copyright.” The examiner downloaded the results of his analysis onto a disc and gave it to the Crystal police department. In April 2011, appellant sent a subpoena to the Hennepin County Sheriff’s Office (HCSO) requesting copies of the hard drives. In response, Assistant Hennepin County 2 Complete copies of the hard drives were made for examination and remain in evidence storage at the Hennepin County Sheriff’s Office. The seized hard drives were then returned to their owners. 3 Attorney Toni Beitz informed appellant that the subpoena was improper and that the HCSO would not release a copy of the hard drives without a court order. Appellant then informed Beitz that he “wished the HCSO to deem [his] subpoena to be a request pursuant to the MGDPA.” Beitz denied appellant’s request to access the hard-drive images because the Crystal police department’s criminal investigation was “still formally not closed” and “all data is technically still confidential.” But Beitz also explained that the HCSO would not provide appellant with the hard-drive images even after the investigation was final. In June 2012, appellant contacted Beitz to ask whether the criminal investigation was complete and when the statute of limitations would expire. He narrowed his request to any documents regarding Boris Parker, Morgan Smith, or himself, including e-mails and recorded conversations between Vilenchik and Parker. Beitz responded that “the criminal investigation still has not been officially closed” and that the statute of limitations was “three years or longer.” Beitz also advised appellant to address any future requests to the Crystal police department or to the HCSO’s responsible authority, respondent Major Tracey Martin. In September, appellant contacted Martin to request access to “any documents (email, letters, etc.) contained on the seized hard drives which are to, from, or mention Boris Parker” and “any audio recordings tha[t] include the voice of, or mention, Boris Parker.” Appellant also requested any documents or recordings that mentioned himself, Kazaryan, Walker, Zubitskiy, McShane, malicious prosecution, or copyright. Martin denied appellant’s request for data and told appellant to address all future inquiries to the 4 City of Crystal because the HCSO “will not release any data without authorization from the City of Crystal.” In December, appellant made another request for data and requested “to be informed if [he was] the subject of any of the data on the hard drive images identified in [his] previous letter.” Martin again denied appellant’s request. Appellant then sued respondents, alleging that “[he] is entitled to access or receive, on an expedited basis, documents [he] requested from [respondents] under the MGDPA.” Appellant requested the district court to (1) compel compliance with the MGDPA, (2) grant declaratory relief, (3) authorize the disclosure of investigative data, and (4) order that he “is entitled to have access to the data he requested in his MGDPA requests” and compel respondents “to provide [him] with access to the requested data.” Respondents moved for summary judgment, arguing that the district court could not compel compliance with the MGDPA because appellant was seeking neither government data nor investigative data under the MGDPA. Respondents also argued that the requested information was protected under the United States and Minnesota Constitutions. Appellant also moved for summary judgment, arguing that he was entitled under the MGDPA to the data on the imaged hard drives that concerned him and his dispute with Vilana and its affiliates. The parties agreed that there were no genuine and material factual disputes. The district court granted respondents’ motion for summary judgment and denied appellant’s motion. The district court concluded that “the data requested by [appellant do] not constitute ‘government data’ under the MGDPA,” nor were they “criminal 5 investigative data under the MGDPA.” Moreover, “a warrantless search of the data by the HCSO, as requested by [appellant], would violate the Fourth Amendment and the Minnesota Constitution.” As additional bases for denying appellant’s requested relief, the district court noted that appellant failed to join Vilenchik as a party and failed to demonstrate a bona fide legal interest because appellant was not entitled to the data. This appeal followed. DECISION The MGDPA regulates the collection, creation, storage, maintenance, dissemination, and access to government data in government entities. It establishes a presumption that government data are public and are accessible by the public for both inspection and copying unless there is federal law, a state statute, or a temporary classification of data that provides that certain data are not public. Minn. Stat. § 13.01, subd. 3 (2012). “The purpose of the MGDPA is to reconcile the rights of data subjects to protect personal information from indiscriminate disclosure with the right of the public to know what the government is doing. The Act also attempts to balance these competing rights within a context of effective government operation.” KSTP-TV v. Ramsey Cnty., 806 N.W.2d 785, 788 (Minn. 2011) (quotation omitted). The district court concluded that the MGDPA’s definition of “government data” was ambiguous as applied here before concluding that “government data” means “only the specific data collected by the Crystal [police department] for its criminal investigation” and “used for a governmental purpose.” Appellant challenges the district 6 court’s determination that the data he requested were not “government data” under the MGDPA. We review the district court’s statutory interpretation of the MGDPA de novo. KSTP-TV, 806 N.W.2d at 788; see also Schwanke v. Minn. Dep’t of Admin., 851 N.W.2d 591, 594 n.1 (Minn. 2014) (applying de novo review to the “legal question[s] of statutory interpretation” when the MGDPA is unambiguous in context (quotation omitted)). Our supreme court recently explained that “‘[d]ata’ are ‘facts that can be analyzed or used in an effort to gain knowledge or make decisions’ or, more broadly, are ‘information.’” Schwanke, 2014 WL 3844200, at *2 (quoting The American Heritage Dictionary of the English Language 462 (5th ed. 2011)). “Government data” are “all data collected, created, received, maintained or disseminated by any government entity regardless of [their] physical form, storage media or conditions of use.” Minn. Stat. § 13.02, subd. 7 (2012). Here, a government entity, the HCSO, collected and maintains data that could be analyzed in the future with a proper warrant. Therefore, the data on the imaged hard drives are “government data” under the MGDPA.3 Although the data are “government data,” we hold that appellant is not entitled to receive copies of or search the hard drives for the information he seeks. Under the MGDPA, government data can be “classified by statute, federal law, or temporary classification as confidential, private, nonpublic, or protected nonpublic [data].” Id., 3 Respondents do not dispute that appellant seeks “data” or that the HCSO is a “government entity” under the MGDPA. They argue that the data are neither “government data” nor “investigative data.” 7 subd. 8a; see also Minn. Stat. § 13.03, subd. 1 (2012) (explaining that government data are public unless federal or state law classify the data as private or confidential). “The United States and Minnesota Constitutions protect ‘the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.’” State v. Diede, 795 N.W.2d 836, 842 (Minn. 2011) (quoting U.S. Const. amend. IV) (citing Minn. Const. art. I, § 10). “A search conducted without a warrant issued upon probable cause is generally unreasonable.” State v. Flowers, 734 N.W.2d 239, 248 (Minn. 2007). A search “occurs upon an official’s invasion of a person’s reasonable expectation of privacy. A reasonable expectation of privacy exists as to areas and objects in which the person invoking the Fourth Amendment has a subjective expectation of privacy that society is prepared to recognize as reasonable.” State v. Johnson, 831 N.W.2d 917, 922 (Minn. App. 2013), review denied (Minn. Sept. 17, 2013). But “the reasonableness of a person’s expectation of privacy is appraised on the basis of the facts as they existed at the time the invasion occurred.” Id. at 923 (quotation omitted). In Johnson, police officers obtained a search warrant authorizing seizure of the appellant’s computer hard drive to search for evidence of child pornography. Id. at 920. An officer seized the appellant’s computer hard drive when executing the search warrant, but the hard drive was not analyzed until seven months later. Id. The appellant argued that the eventual forensic analysis amounted to a warrantless search. Id. at 920-21. We explained that “a person has the same reasonable expectation of privacy in the concealed digital contents of a cellular telephone [or computer hard drive] as a person has in the 8 concealed physical contents of a container.” Id. at 922 (quotation omitted). But “once the government lawfully seizes a container during the execution of a warrant authorizing the search of the container for particularly identified evidence, the owner’s expectation of privacy in that evidence is frustrated.” Id. at 924 (quotation marks omitted). Because there was no substantial likelihood that the appellant in that case had changed the contents of the hard drive after it was seized and because the hard drive was searched only for the evidence sought in the search warrant, the appellant did not have an expectation of privacy in the material on the hard drive that was identified in the warrant. Id. Here, the two search warrants were issued based on probable cause to believe that Vilana’s premises were being used as an unlicensed massage parlor and that Vilenchik had engaged in theft by swindle. The warrants authorized only a search of the computer drives for information related to those two specific crimes. As in Johnson, the Crystal police officers lawfully seized the hard drives, which were the equivalent of “containers” of the data sought by police. See id. “Therefore, the execution of the warrant[s] ‘frustrated’ and terminated [Vilenchik’s and Vilana’s] expectation of privacy in the hard drive[s] and the digital contents identified in the warrant.” See id. (emphasis added). But the execution of the warrants did not frustrate any expectation of privacy in other data contained on the hard drives and not identified in the warrant. See United States v. Carey, 172 F.3d 1268, 1270, 1276 (10th Cir. 1999) (explaining that police officers should generally perform a keyword search of computer files for specific terms sought by the search warrant, and suppressing evidence of child pornography on a computer hard drive 9 when the warrant authorized a search for evidence of drug trafficking). Any search of the hard drives for the data appellant now seeks would be a warrantless search and would invade Vilenchik’s reasonable expectation of privacy.4 See Johnson, 831 N.W.2d at 922. Therefore, a search of the hard drives for the data appellant requested would violate the Fourth Amendment rights of the owner(s) of the hard drives. The United States Supreme Court recently held that police officers “must generally secure a warrant” before searching the cell phones of recently arrested individuals. Riley v. California, 134 S. Ct. 2473, 2485 (2014). Like the cell phones in Riley, the hard drives here contain a large quantity of private information, which police officers cannot lawfully search without a warrant. See id. at 2489, 2494-95 (explaining that cell phones differ from other types of searchable containers because they contain every piece of information about the individual for the past several months or more). And, like the searches of the cell phones in Riley, there is no evidence that any exception to the warrant requirement would justify a warrantless search of the hard drives for appellant’s information. See id. at 2494 (explaining that “other case-specific exceptions may still justify a warrantless search of a particular phone,” but that no such exceptions applied). Contrary to appellant’s suggestion, a search of the hard drives is not equivalent to an inventory search, see Colorado v. Bertine, 479 U.S. 367, 372, 107 S. Ct. 738, 741 (1987) (defining an inventory search), or a “one-time screening” of a President’s papers as authorized by law, see Nixon v. Adm’r of Gen. Servs., 408 F. Supp. 321, 361 n.56 4 The district court observed that appellant should have joined Vilenchik as a party to this lawsuit because the data on the hard drives that was not subject to the search warrants belongs to him and his expectations of privacy in that data have not been disturbed. 10 (D.D.C. 1976) (allowing a warrantless search of President Nixon’s papers according to federal law), aff’d, 433 U.S. 425, 97 S. Ct. 2777 (1977). The owner(s) of the data on the hard drives continue(s) to have a reasonable privacy expectation in the data, except to the extent of the warrants authorizing seizure of the drives for specific and limited purposes. Making the data on the hard drives available for public inspection under the MGDPA under these circumstances would be inconsistent with the constitutional principles underlying Riley. Simply stated, the government collected data on the seized hard drives but may not constitutionally access or inspect the data except as authorized by the warrants. Appellant has commendably briefed the issues, but his argument assumes that, because the data are “government data” under the MGDPA, he is entitled to the data. But appellant ignores the next step in the analysis. Because the owner(s) of the hard drives continue(s) to have a reasonable expectation of privacy concerning all data on those hard drives not authorized to be accessed by the search warrants, the data are either “confidential data on individuals” or “protected nonpublic data.” See Minn. Stat. § 13.02, subds. 3, 13 (2012). Federal constitutional law prohibits the seizure or inspection of the contents of the data beyond the scope of the search warrants. Even if data concerning appellant is contained on the hard drives collected by police officers pursuant to the search warrants, those warrants did not authorize the government to search for or collect that data. The reasonable expectation of privacy of the owner(s) of the hard drives in the contents thereof has not been extinguished or overcome. We therefore hold that the data 11 not authorized by the search warrants to be accessed by the government are inaccessible to appellant or any other person under the MGDPA. Appellant also argues that the Fourth Amendment does not apply to a search conducted by a private individual like himself. In United States v. Jacobsen, airport employees examined a damaged package and discovered a white powdery substance, which police officers later determined to be cocaine. 466 U.S. 109, 111, 104 S. Ct. 1652, 1655 (1984). The United States Supreme Court explained that “[t]he initial invasions of respondents’ package were occasioned by private action” and that such private action does not violate the Fourth Amendment. Id. at 115, 104 S. Ct. at 1657. Citing Jacobsen, appellant argues that his private search of the hard drives cannot violate the Fourth Amendment. But appellant asks the HCSO to conduct an additional search of the hard drives for data beyond the scope of the search warrants. Such a search involves government action, not private action, and triggers Fourth Amendment protection. See id. at 113, 104 S. Ct. at 1656. The district court did not err in granting summary judgment to respondents. Affirmed. 12