Chris Gregerson v. Hennepin County and Tracey Martin

                       This opinion will be unpublished and
                       may not be cited except as provided by
                       Minn. Stat. § 480A.08, subd. 3 (2012).

                            STATE OF MINNESOTA
                            IN COURT OF APPEALS
                                  A14-0487

                                  Chris Gregerson,
                                    Appellant,

                                        vs.

                        Hennepin County and Tracey Martin,
                                  Respondents.

                               Filed October 6, 2014
                                     Affirmed
                                Rodenberg, Judge

                           Hennepin County District Court
                             File No. 27-CV-13-10910

Chris Gregerson, New Richmond, Wisconsin (pro se appellant)

Michael O. Freeman, Hennepin County Attorney, Toni A. Beitz, Assistant County
Attorney, Minneapolis, Minnesota (for respondents)

      Considered and decided by Schellhas, Presiding Judge; Worke, Judge; and

Rodenberg, Judge.

                      UNPUBLISHED OPINION

RODENBERG, Judge

      Appellant Chris Gregerson challenges the district court’s grant of summary

judgment in favor of respondents Hennepin County and Tracey Martin and its denial of

appellant’s request to access data under the Minnesota Government Data Practices Act

(MGDPA). We affirm.
                                        FACTS1

      Appellant maintains a website of stock images that can be licensed or purchased as

prints. In 2005, appellant discovered that Vilana Financial, Inc. had used one of his

photographs without permission. Appellant sued Vilana Financial, Vilana Realty, Inc.,

and the companies’ principal shareholder, Andrew Vilenchik, for copyright infringement.

In 2008, the federal district court awarded appellant $19,462 in actual and statutory

damages for the unauthorized use of his photographs. Gregerson v. Vilana Financial,

Inc., No. 06-1164, 2008 WL 451060, at *10 (D. Minn. Feb. 15, 2008).

      In 2009, appellant sued Vilana Financial, Vilenchik, Vladimir Kazaryan (a Vilana

employee), and their attorneys and law firms, alleging malicious prosecution, abuse of

process, and conspiracy. Hoping to uncover evidence to support his claims of malicious

prosecution against attorney Boris Parker, appellant settled his claims with Vilana and

Vilenchik, in exchange for Vilenchik’s promises to waive his attorney-client privilege

and to turn over correspondence with Parker.         The district court later dismissed

appellant’s remaining claims.      We affirmed the dismissal of appellant’s claims.

Gregerson v. Vilana Financial, Inc., No. A10-0863, 2010 WL 4451820, at *1 (Minn.

App. Nov. 9, 2010), review denied (Minn. Jan. 26, 2011).

      In 2010, the Crystal police department obtained two search warrants to investigate

alleged criminal activities of Vilenchik and the Vilana corporations unrelated to

appellant’s claims. The first search warrant was issued on probable cause to believe that

1
  We provide a detailed factual history leading up to the operative facts giving rise to
appellant’s claims to enable the reader to understand the context of appellant’s claims in
this case.

                                            2
Vilana’s premises were being used as an unlicensed massage parlor and authorized a

search for massage therapy equipment, advertising materials related to massage therapy,

and “computers and peripherals used to place online advertising, produce advertising

materials or schedule client appointments.” The second search warrant was issued on

probable cause to believe that Vilenchik had engaged in theft by swindle in the sale of a

fake diamond and authorized a search for financial and other records relating to diamonds

and “computers and peripherals used to maintain financial transaction records of the

diamond sale or used in the production of fictitious . . . papers.”

       When executing the two search warrants, Crystal police officers seized several

computers. A Hennepin County forensic computer examiner “imaged the hard drives of

sixteen of the seized computers so that [he] could conduct forensic analysis of their

contents, within the parameters specified in the search warrants.”2 The examiner then

used 35 key words provided to him by Crystal police officers to determine whether the

hard drives contained evidence relevant to the theft-by-swindle and unlicensed-massage-

parlor investigations. The key words did not include “Christopher Gregerson, Boris

Parker, Vladimir Kazaryan, Michael Walker, Michael Zubitskiy, McShane, or the topics

‘malicious prosecution,’ or copyright.” The examiner downloaded the results of his

analysis onto a disc and gave it to the Crystal police department.

       In April 2011, appellant sent a subpoena to the Hennepin County Sheriff’s Office

(HCSO) requesting copies of the hard drives. In response, Assistant Hennepin County

2
  Complete copies of the hard drives were made for examination and remain in evidence
storage at the Hennepin County Sheriff’s Office. The seized hard drives were then
returned to their owners.

                                              3
Attorney Toni Beitz informed appellant that the subpoena was improper and that the

HCSO would not release a copy of the hard drives without a court order. Appellant then

informed Beitz that he “wished the HCSO to deem [his] subpoena to be a request

pursuant to the MGDPA.” Beitz denied appellant’s request to access the hard-drive

images because the Crystal police department’s criminal investigation was “still formally

not closed” and “all data is technically still confidential.” But Beitz also explained that

the HCSO would not provide appellant with the hard-drive images even after the

investigation was final.

       In June 2012, appellant contacted Beitz to ask whether the criminal investigation

was complete and when the statute of limitations would expire. He narrowed his request

to any documents regarding Boris Parker, Morgan Smith, or himself, including e-mails

and recorded conversations between Vilenchik and Parker. Beitz responded that “the

criminal investigation still has not been officially closed” and that the statute of

limitations was “three years or longer.” Beitz also advised appellant to address any

future requests to the Crystal police department or to the HCSO’s responsible authority,

respondent Major Tracey Martin.

       In September, appellant contacted Martin to request access to “any documents

(email, letters, etc.) contained on the seized hard drives which are to, from, or mention

Boris Parker” and “any audio recordings tha[t] include the voice of, or mention, Boris

Parker.” Appellant also requested any documents or recordings that mentioned himself,

Kazaryan, Walker, Zubitskiy, McShane, malicious prosecution, or copyright. Martin

denied appellant’s request for data and told appellant to address all future inquiries to the


                                             4
City of Crystal because the HCSO “will not release any data without authorization from

the City of Crystal.”

       In December, appellant made another request for data and requested “to be

informed if [he was] the subject of any of the data on the hard drive images identified in

[his] previous letter.” Martin again denied appellant’s request.

       Appellant then sued respondents, alleging that “[he] is entitled to access or

receive, on an expedited basis, documents [he] requested from [respondents] under the

MGDPA.” Appellant requested the district court to (1) compel compliance with the

MGDPA, (2) grant declaratory relief, (3) authorize the disclosure of investigative data,

and (4) order that he “is entitled to have access to the data he requested in his MGDPA

requests” and compel respondents “to provide [him] with access to the requested data.”

       Respondents moved for summary judgment, arguing that the district court could

not compel compliance with the MGDPA because appellant was seeking neither

government data nor investigative data under the MGDPA. Respondents also argued that

the requested information was protected under the United States and Minnesota

Constitutions. Appellant also moved for summary judgment, arguing that he was entitled

under the MGDPA to the data on the imaged hard drives that concerned him and his

dispute with Vilana and its affiliates. The parties agreed that there were no genuine and

material factual disputes.

       The district court granted respondents’ motion for summary judgment and denied

appellant’s motion. The district court concluded that “the data requested by [appellant

do] not constitute ‘government data’ under the MGDPA,” nor were they “criminal


                                             5
investigative data under the MGDPA.” Moreover, “a warrantless search of the data by

the HCSO, as requested by [appellant], would violate the Fourth Amendment and the

Minnesota Constitution.” As additional bases for denying appellant’s requested relief,

the district court noted that appellant failed to join Vilenchik as a party and failed to

demonstrate a bona fide legal interest because appellant was not entitled to the data. This

appeal followed.

                                     DECISION

       The MGDPA

              regulates the collection, creation, storage, maintenance,
              dissemination, and access to government data in government
              entities. It establishes a presumption that government data
              are public and are accessible by the public for both inspection
              and copying unless there is federal law, a state statute, or a
              temporary classification of data that provides that certain data
              are not public.

Minn. Stat. § 13.01, subd. 3 (2012). “The purpose of the MGDPA is to reconcile the

rights of data subjects to protect personal information from indiscriminate disclosure with

the right of the public to know what the government is doing. The Act also attempts to

balance these competing rights within a context of effective government operation.”

KSTP-TV v. Ramsey Cnty., 806 N.W.2d 785, 788 (Minn. 2011) (quotation omitted).

       The district court concluded that the MGDPA’s definition of “government data”

was ambiguous as applied here before concluding that “government data” means “only

the specific data collected by the Crystal [police department] for its criminal

investigation” and “used for a governmental purpose.” Appellant challenges the district




                                             6
court’s determination that the data he requested were not “government data” under the

MGDPA.

      We review the district court’s statutory interpretation of the MGDPA de novo.

KSTP-TV, 806 N.W.2d at 788; see also Schwanke v. Minn. Dep’t of Admin., 851 N.W.2d

591, 594 n.1 (Minn. 2014) (applying de novo review to the “legal question[s] of statutory

interpretation” when the MGDPA is unambiguous in context (quotation omitted)).

      Our supreme court recently explained that “‘[d]ata’ are ‘facts that can be analyzed

or used in an effort to gain knowledge or make decisions’ or, more broadly, are

‘information.’” Schwanke, 2014 WL 3844200, at *2 (quoting The American Heritage

Dictionary of the English Language 462 (5th ed. 2011)). “Government data” are “all data

collected, created, received, maintained or disseminated by any government entity

regardless of [their] physical form, storage media or conditions of use.” Minn. Stat.

§ 13.02, subd. 7 (2012). Here, a government entity, the HCSO, collected and maintains

data that could be analyzed in the future with a proper warrant. Therefore, the data on the

imaged hard drives are “government data” under the MGDPA.3

      Although the data are “government data,” we hold that appellant is not entitled to

receive copies of or search the hard drives for the information he seeks. Under the

MGDPA, government data can be “classified by statute, federal law, or temporary

classification as confidential, private, nonpublic, or protected nonpublic [data].” Id.,



3
  Respondents do not dispute that appellant seeks “data” or that the HCSO is a
“government entity” under the MGDPA. They argue that the data are neither
“government data” nor “investigative data.”

                                            7
subd. 8a; see also Minn. Stat. § 13.03, subd. 1 (2012) (explaining that government data

are public unless federal or state law classify the data as private or confidential).

       “The United States and Minnesota Constitutions protect ‘the right of the people to

be secure in their persons, houses, papers, and effects, against unreasonable searches and

seizures.’” State v. Diede, 795 N.W.2d 836, 842 (Minn. 2011) (quoting U.S. Const.

amend. IV) (citing Minn. Const. art. I, § 10). “A search conducted without a warrant

issued upon probable cause is generally unreasonable.” State v. Flowers, 734 N.W.2d

239, 248 (Minn. 2007). A search “occurs upon an official’s invasion of a person’s

reasonable expectation of privacy. A reasonable expectation of privacy exists as to areas

and objects in which the person invoking the Fourth Amendment has a subjective

expectation of privacy that society is prepared to recognize as reasonable.” State v.

Johnson, 831 N.W.2d 917, 922 (Minn. App. 2013), review denied (Minn. Sept. 17, 2013).

But “the reasonableness of a person’s expectation of privacy is appraised on the basis of

the facts as they existed at the time the invasion occurred.”          Id. at 923 (quotation

omitted).

       In Johnson, police officers obtained a search warrant authorizing seizure of the

appellant’s computer hard drive to search for evidence of child pornography. Id. at 920.

An officer seized the appellant’s computer hard drive when executing the search warrant,

but the hard drive was not analyzed until seven months later. Id. The appellant argued

that the eventual forensic analysis amounted to a warrantless search. Id. at 920-21. We

explained that “a person has the same reasonable expectation of privacy in the concealed

digital contents of a cellular telephone [or computer hard drive] as a person has in the


                                               8
concealed physical contents of a container.” Id. at 922 (quotation omitted). But “once

the government lawfully seizes a container during the execution of a warrant authorizing

the search of the container for particularly identified evidence, the owner’s expectation of

privacy in that evidence is frustrated.” Id. at 924 (quotation marks omitted). Because

there was no substantial likelihood that the appellant in that case had changed the

contents of the hard drive after it was seized and because the hard drive was searched

only for the evidence sought in the search warrant, the appellant did not have an

expectation of privacy in the material on the hard drive that was identified in the warrant.

Id.

       Here, the two search warrants were issued based on probable cause to believe that

Vilana’s premises were being used as an unlicensed massage parlor and that Vilenchik

had engaged in theft by swindle. The warrants authorized only a search of the computer

drives for information related to those two specific crimes. As in Johnson, the Crystal

police officers lawfully seized the hard drives, which were the equivalent of “containers”

of the data sought by police.     See id.   “Therefore, the execution of the warrant[s]

‘frustrated’ and terminated [Vilenchik’s and Vilana’s] expectation of privacy in the hard

drive[s] and the digital contents identified in the warrant.” See id. (emphasis added). But

the execution of the warrants did not frustrate any expectation of privacy in other data

contained on the hard drives and not identified in the warrant. See United States v.

Carey, 172 F.3d 1268, 1270, 1276 (10th Cir. 1999) (explaining that police officers should

generally perform a keyword search of computer files for specific terms sought by the

search warrant, and suppressing evidence of child pornography on a computer hard drive


                                             9
when the warrant authorized a search for evidence of drug trafficking). Any search of the

hard drives for the data appellant now seeks would be a warrantless search and would

invade Vilenchik’s reasonable expectation of privacy.4 See Johnson, 831 N.W.2d at 922.

Therefore, a search of the hard drives for the data appellant requested would violate the

Fourth Amendment rights of the owner(s) of the hard drives.

       The United States Supreme Court recently held that police officers “must

generally secure a warrant” before searching the cell phones of recently arrested

individuals. Riley v. California, 134 S. Ct. 2473, 2485 (2014). Like the cell phones in

Riley, the hard drives here contain a large quantity of private information, which police

officers cannot lawfully search without a warrant. See id. at 2489, 2494-95 (explaining

that cell phones differ from other types of searchable containers because they contain

every piece of information about the individual for the past several months or more).

And, like the searches of the cell phones in Riley, there is no evidence that any exception

to the warrant requirement would justify a warrantless search of the hard drives for

appellant’s information. See id. at 2494 (explaining that “other case-specific exceptions

may still justify a warrantless search of a particular phone,” but that no such exceptions

applied). Contrary to appellant’s suggestion, a search of the hard drives is not equivalent

to an inventory search, see Colorado v. Bertine, 479 U.S. 367, 372, 107 S. Ct. 738, 741

(1987) (defining an inventory search), or a “one-time screening” of a President’s papers

as authorized by law, see Nixon v. Adm’r of Gen. Servs., 408 F. Supp. 321, 361 n.56

4
  The district court observed that appellant should have joined Vilenchik as a party to this
lawsuit because the data on the hard drives that was not subject to the search warrants
belongs to him and his expectations of privacy in that data have not been disturbed.

                                            10
(D.D.C. 1976) (allowing a warrantless search of President Nixon’s papers according to

federal law), aff’d, 433 U.S. 425, 97 S. Ct. 2777 (1977). The owner(s) of the data on the

hard drives continue(s) to have a reasonable privacy expectation in the data, except to the

extent of the warrants authorizing seizure of the drives for specific and limited purposes.

Making the data on the hard drives available for public inspection under the MGDPA

under these circumstances would be inconsistent with the constitutional principles

underlying Riley. Simply stated, the government collected data on the seized hard drives

but may not constitutionally access or inspect the data except as authorized by the

warrants.

       Appellant has commendably briefed the issues, but his argument assumes that,

because the data are “government data” under the MGDPA, he is entitled to the data. But

appellant ignores the next step in the analysis. Because the owner(s) of the hard drives

continue(s) to have a reasonable expectation of privacy concerning all data on those hard

drives not authorized to be accessed by the search warrants, the data are either

“confidential data on individuals” or “protected nonpublic data.” See Minn. Stat. § 13.02,

subds. 3, 13 (2012). Federal constitutional law prohibits the seizure or inspection of the

contents of the data beyond the scope of the search warrants. Even if data concerning

appellant is contained on the hard drives collected by police officers pursuant to the

search warrants, those warrants did not authorize the government to search for or collect

that data. The reasonable expectation of privacy of the owner(s) of the hard drives in the

contents thereof has not been extinguished or overcome. We therefore hold that the data




                                            11
not authorized by the search warrants to be accessed by the government are inaccessible

to appellant or any other person under the MGDPA.

       Appellant also argues that the Fourth Amendment does not apply to a search

conducted by a private individual like himself. In United States v. Jacobsen, airport

employees examined a damaged package and discovered a white powdery substance,

which police officers later determined to be cocaine. 466 U.S. 109, 111, 104 S. Ct. 1652,

1655 (1984). The United States Supreme Court explained that “[t]he initial invasions of

respondents’ package were occasioned by private action” and that such private action

does not violate the Fourth Amendment. Id. at 115, 104 S. Ct. at 1657. Citing Jacobsen,

appellant argues that his private search of the hard drives cannot violate the Fourth

Amendment. But appellant asks the HCSO to conduct an additional search of the hard

drives for data beyond the scope of the search warrants.        Such a search involves

government action, not private action, and triggers Fourth Amendment protection. See

id. at 113, 104 S. Ct. at 1656.

       The district court did not err in granting summary judgment to respondents.

       Affirmed.




                                           12