Skip to content

Compliance Building

Doug Cornelius on compliance for private equity real estate

Menu
  • Home
  • About
    • About
    • About Doug
    • About This Website
    • Why I Blog
    • Speaking Engagements
    • Contact
    • Publications
  • Archives
    • Topic Archive
    • Book Reviews
    • Most Popular
  • Subscribe
  • Disclaimers
    • Disclaimers
    • Policies and Procedures
    • Use of Site Content
    • Comments
    • FTC Disclosure
Menu

Another Reason to Secure Your Wireless Network

Posted on February 10, 2010February 10, 2010 by Doug Cornelius
Print Friendly, PDF & Email
Linksys WRT54GL

If you care about network security, you are probably well aware of the Massachusetts Data Privacy Law and its requirement to secure wireless networks.

But password-protecting a wireless router also has constitutional significance.

A child pornography suspect had no constitutionally protected privacy right in the files found on his personal computer, accessible by a neighbor who was piggybacking on his unsecured wireless network.

A neighbor stumbled across the shared files and alerted the local sheriff. After coming by to see the files, the sheriff ran license plates on cars on the street and found one nearby that was registered to a convicted sex offender. The sheriff then obtained warrants to determine the subscribers IP address and eventually to seize the computers.

Even though the defendant confessed on the spot, his lawyer tried to get all of the evidence thrown out claiming the sheriff violated the defendant’s reasonable expectation of privacy. The government disagreed and said the “defendant’s conduct in operating his home computer eliminated his right to privacy.”

The case ended up with Judge King in the Oregon’s United States District Court in the case of U.S. v. Ahrndt.

The case even quotes one of my favorite columns: The Ethicist by Randy Cohen in The New York Times: Wi-Fi Fairness Feb 8, 2004. Cohen came to the conclusion that “you may use but not overuse Wi-Fi hot spots you encounter.”

The judge steps over the issue of whether it is legal or not to access an open wi-fi hotspot, but is happy to point out that the accidental unauthorized use of other people’s wireless networks is a fairly common occurrence in densely populated urban environments.

“As a result of the ease and frequency with which people use others’ wireless networks, I conclude that society recognizes a lower expectation ofprivacy in information broadcast via an unsecured wireless network router than in information transmitted through a hardwired network or password-protected network.”

The judge also found “when a person shares files on iTunes over an unsecured wireless network, it is like leaving one’s documents in a box marked ‘take a look’ at the end of a cul-de-sac.” In the end, the defendant’s conduct in operating his software and maintaining his router diminished his reasonable expectation of privacy.

So not only, will improperly maintaining your wireless network open you to data loss and liability under privacy laws, but you diminish your constitutional protections.

Sources:

  • United States v. Ahrndt, No. 08-cr-468 (D. Ore. Jan. 28, 2010) – hosted on JD Supra
  • No expectation of privacy in computer connected to unsecured wireless network by Steve Meltzer of the Data Privacy Regulation & Management Blog
  • Court Finds Constitutional Significance in Defendant’s Failure to Password-Protect Home Wireless Network from the E-Commerce and Tech law blog
  • The Ethicist by Randy Cohen in The New York Times: Wi-Fi Fairness Feb 8, 2004

Share this:

  • Print (Opens in new window) Print
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on X (Opens in new window) X
  • Email a link to a friend (Opens in new window) Email

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search for Stuff

Recent Stories

  • Updates to the SEC Enforcement Manual
  • When Drug Lords Want Their Kids to Be Better Athletes
  • Insider Trading Before Bankruptcy
  • Relief for ’40 Act Funds
  • Artificial Intelligence Produced Materials are Not Protected by Privilege
  • FINRA Looks to Allow Projected Performance
  • California’s Fair Investment Practices by Venture Capital Companies
  • Compliance Bricks and Mortar for January 30
  • Interpreter Insider Trading
  • Things not to put in Advisory Contracts – Hedges

Fight Cancer

Please support my Pan-Mass Challenge
Make a donation to fight cancer. donate.pmc.org/DC0176
pan-mass challenge badge

I am a lawyer, but I am not your lawyer. Since I’m a lawyer, this website may be considered attorney advertising under the ethical rules of certain jurisdictions. Please read my disclaimers page before taking any action. And then, don't take any action based on what I wrote.

Creative Commons logo with the text 'Some Rights Reserved' and three symbols representing attribution, non-commercial use, and share alike.

Compliance Building - by Doug Cornelius is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.