{"id":29399,"date":"2022-03-05T16:13:55","date_gmt":"2022-03-05T16:13:55","guid":{"rendered":"https:\/\/cjstudents.com\/?p=29399"},"modified":"2022-03-05T16:13:55","modified_gmt":"2022-03-05T16:13:55","slug":"interrogating-the-regulation-of-private-investigators","status":"publish","type":"post","link":"https:\/\/cjstudents.com\/index.php\/2022\/03\/05\/interrogating-the-regulation-of-private-investigators\/","title":{"rendered":"Interrogating the Regulation of Private Investigators"},"content":{"rendered":"<p> [ad_1]<\/p>\n<div id=\"post_content\">\n<div class=\"post_img\"> <img decoding=\"async\" width=\"799\" height=\"470\" src=\"https:\/\/www.theregreview.org\/wp-content\/uploads\/2022\/03\/923497448.jpg\" class=\"attachment-post-thumbnail-large size-post-thumbnail-large wp-post-image\" alt=\"Surveillance equipment in the front seat of a car.\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.theregreview.org\/wp-content\/uploads\/2022\/03\/923497448.jpg 799w, https:\/\/www.theregreview.org\/wp-content\/uploads\/2022\/03\/923497448-300x176.jpg 300w, https:\/\/www.theregreview.org\/wp-content\/uploads\/2022\/03\/923497448-768x452.jpg 768w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\"\/><\/div>\n<div class=\"entry_content\">\n<div class=\"post_excerpt\">\n<p>Scholars discuss regulation of the private investigation industry.<\/p>\n<\/div>\n<p>If private investigators collect information from your Facebook account, can they share it with their client seeking legal action against you?<\/p>\n<p>In the United States, the answer to this question <a target=\"_blank\" href=\"https:\/\/openyls.law.yale.edu\/bitstream\/handle\/20.500.13051\/7815\/BrianMundSocialMediaSearc.pdf?sequence=2&amp;isAllowed=y\" rel=\"noopener\">depends<\/a> on the constitutional limitations of the <a target=\"_blank\" href=\"https:\/\/constitution.congress.gov\/constitution\/amendment-4\/\" rel=\"noopener\">Fourth Amendment<\/a>.<\/p>\n<p>What if investigators obtained information illegally and fail to tell the law firm that hired them how they got the information?<\/p>\n<p>This activity would likely breach the lawyer\u2019s professional responsibility obligations because the Model Rules of Professional Conduct <a target=\"_blank\" href=\"https:\/\/www.americanbar.org\/groups\/professional_responsibility\/publications\/model_rules_of_professional_conduct\/rule_5_3_responsibilities_regarding_nonlawyer_assistant\/\" rel=\"noopener\">hold<\/a> lawyers liable for the conduct of the third parties they supervise.<\/p>\n<p>Many lawyers and large law firms <a target=\"_blank\" href=\"https:\/\/datausa.io\/profile\/soc\/private-detectives-investigators#:~:text=The%20number%20of%20people%20employed,investigators%20employed%20by%20various%20industries.\" rel=\"noopener\">hire<\/a> private investigators to gather information related to litigation. These private investigators may <a target=\"_blank\" href=\"https:\/\/www.denverlawreview.org\/dlr-online-article\/2015\/5\/7\/on-the-ethical-use-of-private-investigators.html\" rel=\"noopener\">use<\/a> social media sleuthing, GPS tracking, or sometimes other covert strategies such as <a target=\"_blank\" href=\"https:\/\/www.denverlawreview.org\/dlr-online-article\/2015\/5\/7\/on-the-ethical-use-of-private-investigators.html\" rel=\"noopener\">pretexting<\/a>\u2014the practice of using disguise to gain information from a target\u2014to gather intel for their client. The legality of lawyers\u2019 use of private investigators who engage in some of these more deceptive behaviors is widely <a target=\"_blank\" href=\"https:\/\/www.nycbar.org\/member-and-career-services\/committees\/reports-listing\/reports\/detail\/regulating-lawyers-supervision-of-undercover-investigations-report\" rel=\"noopener\">debated<\/a> across U.S. jurisdictions.<\/p>\n<p>Despite the high stakes and complicated legal rules, some private investigators legitimately <a target=\"_blank\" href=\"https:\/\/atg.sd.gov\/LawEnforcement\/training\/faq.aspx#:~:text=in%20South%20Dakota%3F-,A.,obtain%20a%20sales%20tax%20license.\" rel=\"noopener\">operate<\/a> without licenses or formal training. As of 2019, just over 96,000 private investigators were <a target=\"_blank\" href=\"https:\/\/datausa.io\/profile\/soc\/private-detectives-investigators#:~:text=The%20number%20of%20people%20employed,investigators%20employed%20by%20various%20industries.\" rel=\"noopener\">employed<\/a> in the United States. The federal government does not regulate the private surveillance industry, and state-level regulation of these investigators varies widely. Most states such as New York <a target=\"_blank\" href=\"https:\/\/dos.ny.gov\/system\/files\/documents\/2021\/08\/pibailwtchguard.pdf#page=4\" rel=\"noopener\">require<\/a> private investigators to apply for and maintain licenses, but other states, such as Idaho, do not <a target=\"_blank\" href=\"https:\/\/www.piai.us\/\" rel=\"noopener\">regulate<\/a> private investigators at the state level.<\/p>\n<p>Lawmakers outside of the United States also inconsistently regulate private investigators. Experts in other countries have <a target=\"_blank\" href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1043986219890194#page=9\" rel=\"noopener\">expressed<\/a> concerns about the lack of regulation of the private surveillance industry.<\/p>\n<p>In this week\u2019s Saturday Seminar, we survey recent scholarship by experts examining the regulation of the private surveillance industry across the world.<\/p>\n<ul>\n<li>Fewer regulations exist for privatized surveillance than public surveillance practices, <a target=\"_blank\" href=\"https:\/\/uk.linkedin.com\/in\/kevinmacnish\" rel=\"noopener\">Kevin Macnish<\/a> of the <a target=\"_blank\" href=\"https:\/\/www.leeds.ac.uk\/\" rel=\"noopener\">University of Leeds<\/a>, <a target=\"_blank\" href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/S2398-601820210000008002\/full\/pdf#page=5\" rel=\"noopener\">explains<\/a> in a chapter of his book entitled <a target=\"_blank\" href=\"https:\/\/www.routledge.com\/The-Ethics-of-Surveillance-An-Introduction\/Macnish\/p\/book\/9781138643796\" rel=\"noopener\"><em>The Ethics of Surveillance: An Introduction<\/em><\/a><em>. <\/em>Accordingly, Macnish <a target=\"_blank\" href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/S2398-601820210000008002\/full\/pdf#page=5\" rel=\"noopener\">argues<\/a> that defining the ethical limitations of private surveillance is difficult. For ethics in private investigation, Macnish <a target=\"_blank\" href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/S2398-601820210000008002\/full\/pdf#page=6\" rel=\"noopener\">points<\/a> to questions of honesty that can arise when an investigator uses feigning tactics to elicit information. In assessing the ethical nature of privatized surveillance, Macnish <a target=\"_blank\" href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/S2398-601820210000008002\/full\/pdf#page=5\" rel=\"noopener\">notes<\/a> the importance of considering the proportionality of the extent of the surveillance to the harm done.<\/li>\n<li>The lack of regulation of private investigations in Australia has historically caused unease within the industry, <a target=\"_blank\" href=\"https:\/\/researchoutput.csu.edu.au\/en\/persons\/michael-king\" rel=\"noopener\">Michael King<\/a> of Australia\u2019s <a target=\"_blank\" href=\"https:\/\/www.csu.edu.au\/\" rel=\"noopener\">Charles Sturt University<\/a>, <a target=\"_blank\" href=\"https:\/\/eprints.qut.edu.au\/212983\/1\/Michael_King_Thesis.pdf#page=47\" rel=\"noopener\">explains<\/a> in a paper. King <a target=\"_blank\" href=\"https:\/\/eprints.qut.edu.au\/212983\/1\/Michael_King_Thesis.pdf#page=44\" rel=\"noopener\">highlights<\/a> an Australian Law Reform Commission <a target=\"_blank\" href=\"http:\/\/www.austlii.edu.au\/au\/other\/lawreform\/ALRC\/1983\/22.html\" rel=\"noopener\">report<\/a> that found that private investigators\u2019 work often leads to infringements on privacy and breaches in confidentiality. King <a target=\"_blank\" href=\"https:\/\/eprints.qut.edu.au\/212983\/1\/Michael_King_Thesis.pdf#page=46\" rel=\"noopener\">underscores<\/a> the dearth of current private investigatory work by Australian experts and<a target=\"_blank\" href=\"https:\/\/eprints.qut.edu.au\/212983\/1\/Michael_King_Thesis.pdf#page=240\" rel=\"noopener\"> emphasizes<\/a> the need for more regulatory attention on the private investigator licensing processes to combat privacy concerns.<\/li>\n<li>International Criminal Tribunals must exclude evidence that private investigators obtain illegally, urges <a target=\"_blank\" href=\"https:\/\/www.uni-goettingen.de\/de\/627750.html\" rel=\"noopener\">Alexander Heinze<\/a> of Germany\u2019s <a target=\"_blank\" href=\"https:\/\/www.uni-goettingen.de\/\" rel=\"noopener\">University of Gottingen<\/a> in an <a target=\"_blank\" href=\"https:\/\/online.ucpress.edu\/nclr\/article\/24\/2\/212\/116808\/Evidence-Illegally-Obtained-by-Private?searchresult=1\" rel=\"noopener\">article<\/a> in the <a target=\"_blank\" href=\"https:\/\/online.ucpress.edu\/nclr\" rel=\"noopener\"><em>New Criminal Law Review<\/em><\/a>. These illegal methods <a target=\"_blank\" href=\"https:\/\/www.uni-goettingen.de\/de\/document\/download\/d2208464def19d4daee6af09abacb682.pdf\/Heinze,%20New%20Criminal%20Law%20Review%2024(2),%202021,%20212%C3%A2%E2%82%AC%E2%80%9C253.pdf#page=2\" rel=\"noopener\">include<\/a> bribery, preparation of false evidence, and inappropriate use of evidence. Heinze <a target=\"_blank\" href=\"https:\/\/www.uni-goettingen.de\/de\/document\/download\/d2208464def19d4daee6af09abacb682.pdf\/Heinze,%20New%20Criminal%20Law%20Review%2024(2),%202021,%20212%C3%A2%E2%82%AC%E2%80%9C253.pdf#page=18\" rel=\"noopener\">argues<\/a> that procedural laws do not apply only to state actors, but to the entire criminal justice system. Heinze <a target=\"_blank\" href=\"https:\/\/www.uni-goettingen.de\/de\/document\/download\/d2208464def19d4daee6af09abacb682.pdf\/Heinze,%20New%20Criminal%20Law%20Review%2024(2),%202021,%20212%C3%A2%E2%82%AC%E2%80%9C253.pdf#page=19\" rel=\"noopener\">explains<\/a> that due process should require that rules excluding illegally obtained evidence apply to private investigators.<\/li>\n<li>Because Sweden\u2019s regulations fail to establish legitimacy and accountability for the private security industry, <a target=\"_blank\" href=\"https:\/\/www.uwl.ac.uk\/staff\/peter-stiernstedt\" rel=\"noopener\">Peter Stiernstedt<\/a> of the <a target=\"_blank\" href=\"https:\/\/www.uwl.ac.uk\/\" rel=\"noopener\">University of West London<\/a> recommends the revision of Swedish private security regulations in a forthcoming <a target=\"_blank\" href=\"https:\/\/repository.uwl.ac.uk\/id\/eprint\/6593\/1\/Stiernstedt_PJPP_2019_Privatizing_police_discretion%E2%80%94%E2%80%98private_security_criminal_investigations%E2%80%99_in_Sweden.pdf\" rel=\"noopener\">article<\/a> in <a target=\"_blank\" href=\"https:\/\/academic.oup.com\/policing\" rel=\"noopener\"><em>Policing: A Journal of Policy and Practice<\/em><\/a>. Through interviews with key stakeholders and experts, Stiernstedt <a target=\"_blank\" href=\"https:\/\/repository.uwl.ac.uk\/id\/eprint\/6593\/1\/Stiernstedt_PJPP_2019_Privatizing_police_discretion%E2%80%94%E2%80%98private_security_criminal_investigations%E2%80%99_in_Sweden.pdf#page=20\" rel=\"noopener\">finds<\/a> that regulators lack the authority to hold private security companies accountable to existing regulations. Stiernstedt also <a target=\"_blank\" href=\"https:\/\/repository.uwl.ac.uk\/id\/eprint\/6593\/1\/Stiernstedt_PJPP_2019_Privatizing_police_discretion%E2%80%94%E2%80%98private_security_criminal_investigations%E2%80%99_in_Sweden.pdf#page=24\" rel=\"noopener\">warns<\/a> that a rise in private criminal investigations could lead to police complacency, which could, in turn, reduce public trust in the criminal justice system.<\/li>\n<li>In a forthcoming article in <a target=\"_blank\" href=\"https:\/\/www.bu.edu\/bulawreview\/\" rel=\"noopener\"><em>Boston University Law Review<\/em><\/a><em>, <\/em><a target=\"_blank\" href=\"https:\/\/www.law.virginia.edu\/faculty\/profile\/uqg7tt\/2964150\" rel=\"noopener\">Danielle Keats Citron<\/a> of the <a target=\"_blank\" href=\"https:\/\/www.law.virginia.edu\/\" rel=\"noopener\">University of Virginia School of Law<\/a> and <a target=\"_blank\" href=\"https:\/\/www.law.gwu.edu\/daniel-justin-solove\" rel=\"noopener\">Daniel J. Solove<\/a> of <a target=\"_blank\" href=\"https:\/\/www.law.gwu.edu\/\" rel=\"noopener\">George Washington University Law School<\/a> <a target=\"_blank\" href=\"https:\/\/www.cs.cornell.edu\/~shmat\/courses\/cs5436\/citron.pdf#page=36\" rel=\"noopener\">delineate<\/a> the link between private investigators and the physical harms that can arise from privacy violations. Citron and Solove<a target=\"_blank\" href=\"https:\/\/www.cs.cornell.edu\/~shmat\/courses\/cs5436\/citron.pdf#page=36\" rel=\"noopener\"> say<\/a> that the dissemination of personal data to entities like private investigators can lead to opportunities for bodily violence. This physical harm usually occurs when those in possession of sensitive personal information \u201cnegligently, knowingly, or purposefully\u201d <a target=\"_blank\" href=\"https:\/\/www.cs.cornell.edu\/~shmat\/courses\/cs5436\/citron.pdf#page=36\" rel=\"noopener\">allow<\/a> a third party to harm another person, according to Citron and Solove. The authors <a target=\"_blank\" href=\"https:\/\/www.cs.cornell.edu\/~shmat\/courses\/cs5436\/citron.pdf#page=38\" rel=\"noopener\">attribute<\/a> the perpetuation of physical harms from privacy violations in large part to courts\u2019 reluctance to recognize the disclosure of data as a source of physical injury and call for a legal recognition of these harmful outcomes.<\/li>\n<li>Ukraine currently has no laws on private detective work, <a target=\"_blank\" href=\"https:\/\/lbku.krok.edu.ua\/krok-university-law-journal\/article\/download\/266\/221#page=7\" rel=\"noopener\">explains<\/a> <a target=\"_blank\" href=\"https:\/\/www.krok.edu.ua\/ua\/pro-krok\/spivrobitniki\/gorelova-veronika-yurijivna\" rel=\"noopener\">Veronica Horielova<\/a>, of Ukraine\u2019s <a target=\"_blank\" href=\"https:\/\/int.krok.edu.ua\/en\/about\/krok\" rel=\"noopener\">University of Economics and Law KROK<\/a>. Horielova <a target=\"_blank\" href=\"https:\/\/lbku.krok.edu.ua\/krok-university-law-journal\/article\/download\/266\/221#page=7\" rel=\"noopener\">notes<\/a> that privacy, private property, accuracy, and accessibility are universal components of ethical codes for private detectives in other countries. Horielova <a target=\"_blank\" href=\"https:\/\/lbku.krok.edu.ua\/krok-university-law-journal\/article\/download\/266\/221#page=7\" rel=\"noopener\">argues<\/a> that research on the ethics of private detective work should serve as the foundation for any new laws regulating private detectives\u2019 use of emerging surveillance technologies.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.theregreview.org\/2022\/03\/05\/saturday-seminar-interrogating-regulation-private-investigators\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Scholars discuss regulation of the private investigation industry. If private investigators collect information from&#8230;<\/p>\n","protected":false},"author":1,"featured_media":29400,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-29399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research"],"_links":{"self":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts\/29399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/comments?post=29399"}],"version-history":[{"count":1,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts\/29399\/revisions"}],"predecessor-version":[{"id":29401,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts\/29399\/revisions\/29401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/media\/29400"}],"wp:attachment":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/media?parent=29399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/categories?post=29399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/tags?post=29399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}